Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack detection method for data transmission in networked control system

A networked control and data transmission technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as inability to attack and detect, and achieve the effect of convenient and fast finding

Active Publication Date: 2022-04-12
HARBIN INST OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem that existing methods cannot detect attacks that have not occurred in history, and propose an attack detection method for data transmission in networked control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method for data transmission in networked control system
  • Attack detection method for data transmission in networked control system
  • Attack detection method for data transmission in networked control system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0053] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS 1. This implementation will be described with reference to FIG. 1 . An attack detection method for data transmission in a networked control system described in this embodiment, the method specifically includes the following steps:

[0054] Step 1. Construct data encryption model and decryption model;

[0055] Step 2. After normalizing the data in each dimension in the historically collected raw sensor data, use the normalized data to train the encryption model and the decryption model;

[0056] And store the maximum and minimum values ​​of each feature extracted by the encryption model in the historical sensor data;

[0057] Step 3. Encapsulate the trained encryption model and decryption model. The functional relationship after encapsulation is:

[0058] Encryption model: x trans =f(x meas ) (7)

[0059] Decrypted model:

[0060] where x meas is the sensor data to be encrypted, x trans is the encrypted sensor d...

specific Embodiment approach 2

[0081] Specific implementation mode two: the difference between this implementation mode and specific implementation mode one is that the specific process of the step one is:

[0082] The encoding part of the autoencoder is used as the data encryption model, and the decoding part of the autoencoder is used as the data decryption model, where the encoding part of the autoencoder has the same number of layers as the decoding part, and the encoding part and The number of nodes in the decoding part is mirror-symmetrical.

[0083] The reconstruction effect of the model needs to be evaluated using the RMSE function. The smaller the RMSE, the better the model reconstruction effect. When the RMSE meets the actual accuracy requirements, it can be used for subsequent use. Otherwise, continue to adjust the network structure and continue training, such as deepening the network or increasing the number of nodes. . The calculation formula of RMSE is as follows:

[0084]

specific Embodiment approach 3

[0085] Embodiment 3: This embodiment is different from Embodiment 2 in that the number of nodes in the encoding layer of the autoencoder decreases layer by layer, and the overall shape is hourglass.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An attack detection method for data transmission in a networked control system belongs to the field of attack detection for data transmission. The invention solves the problem that the existing method cannot detect attacks that have not occurred in history. The present invention can realize the detection of multiple attacks by establishing a detection channel, and the detection uses an unsupervised method. Compared with the attack detection method using a classifier, the present invention does not require additional attacked data to train the classification when training the model At the same time, it can also effectively detect attacks that have not appeared in history. Through the residual analysis of the transmitted signal and the reconstructed signal, the channel under attack can be judged, so that the channel under attack can be found quickly. The invention can be applied to the attack detection of data transmission in the networked control system.

Description

technical field [0001] The invention belongs to the field of attack detection of data transmission, in particular to an attack detection method of data transmission in a networked control system. Background technique [0002] When data flows between digital controllers, sensors, and actuators, it needs to rely on communication channels for transmission. Therefore, it is vulnerable to wrong data injection attacks, denial of service attacks, and replay attacks in the communication network. These potential attacks bring new challenges to the control network. There is a huge security risk, and once the system is attacked, it will cause huge economic losses. Whether attacks can be prevented or can be located and detected in a timely manner plays a vital role in maintaining system performance. At present, the detection methods for the three attacks mainly include digital signature technology, digital watermark technology and observer technology. [0003] With the enrichment of i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416
Inventor 吴诗梦蒋宇辰罗浩张九思尹珅李献领
Owner HARBIN INST OF TECH