Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active attack detection method for improving detection rate

A technology of active attack and detection method, applied in the direction of electrical test/monitoring, test/monitoring control system, instrument, etc., to achieve the effect of improving malicious attack detection rate and attack detection rate

Pending Publication Date: 2022-02-18
SHENYANG AEROSPACE UNIVERSITY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the problem of active attack detection for systems with unknown but bounded noise has always been a major problem for those skilled in the art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active attack detection method for improving detection rate
  • Active attack detection method for improving detection rate
  • Active attack detection method for improving detection rate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0083] Such as figure 1 As shown, the method of the present embodiment is as follows;

[0084] Step 1: Obtain observation residual data and perform data processing;

[0085] Step 1.1: Obtain observation residual data;

[0086] Step 1.1.1: Build a linear system model with unknown but bounded noise:

[0087] A linear system model with unknown but bounded noise is as follows:

[0088] x k+1 =Ax k +ω k (1)

[0089] the y k =Cx k +v k (2)

[0090] in, is the system state, n x is the system state dimension, is the system output, n y Output dimension for the system, A and C are system matrices of dimension, and is unknown but bounded noise; the initial state of the system satisfies 0 , H 0 > means the center is p 0 , the generating matrix is ​​H 0 The fully symmetrical polytope of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an active attack detection method capable of improving the detection rate when network attacks exist. Through preprocessing and data recovery of the observer residual error, the designed active attack detector can significantly improve the attack detection rate in combination with the watermarking technology. The method can be simultaneously suitable for attack detection problems of denial of service attack, replay attack and false data attack, and has very high application value.

Description

technical field [0001] The invention belongs to the field of network attack detection in cyber-physical system security, and in particular relates to an active attack that improves the detection rate when a linear system with unknown but bounded noise is attacked by using the fully symmetrical polytope theory and watermarking technology Detection method. Background technique [0002] Cyber-physical system (CPS) is an intelligent system integrating control, communication and computing. On the basis of intelligent perception and information communication, the deep integration of computing, communication and control can be realized through the mutual influence of information computing and physical processes, and the physical system can be detected and controlled in a safe, reliable, efficient and real-time manner to realize the autonomy of the whole system and collaboration. Due to the existence of communication networks, attackers can not only carry out physical attacks, but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02
CPCG05B23/0243G05B2219/24065
Inventor 刘皓张红梅张磊仇少菲
Owner SHENYANG AEROSPACE UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products