Attack detection method and device for privacy protection-oriented cyber-physical system

A cyber-physical system and attack detection technology, applied in the field of network information security, can solve problems such as large attack space, and achieve the effect of good detection rate

Active Publication Date: 2022-04-12
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the deployment of differential privacy mechanisms in cyber-physical systems also leaves a larger attack space for malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device for privacy protection-oriented cyber-physical system
  • Attack detection method and device for privacy protection-oriented cyber-physical system
  • Attack detection method and device for privacy protection-oriented cyber-physical system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0082] figure 2 A block diagram of an attack detection method for a privacy-protected cyber-physical system provided by an embodiment of the present application.

[0083] As mentioned in the above-mentioned embodiment, the data sender aggregates the data with noise Perform a preset nonlinear transformation, specifically, the noise-added aggregation data can be Multiply by non-linear transformation multipliers generated based on convention rules On this basis, preferably, the non-linear transformation multiplier can specifically adopt a value generated by a pseudo-random number generator; the seed of the pseudo-random number generator is generated from agreed data.

[0084] Generate non-linear transformation multipliers by employing a pseudo-random number generator On the basis of the distributed differential privacy mechanism, the Moving Target Defense (MTD) method is integrated, which increases the randomness and unpredictability of the aggregated data to be transmitte...

Embodiment 3

[0089] image 3 It is a block diagram of another attack detection method for a privacy-protected cyber-physical system provided by the embodiment of the present application.

[0090] The foregoing embodiments introduce methods for attack detection in cyber-physical systems. In practical applications, today's smart grid, as a kind of cyber-physical system, also faces two major problems of privacy protection and attack detection.

[0091] Today's smart grid combines network and information technology, and connects electricity consumers and electricity suppliers through new monitoring equipment such as smart meters. The power supply side can effectively control the marginal power supply cost through the real-time pricing mechanism of electricity price, and the power consumer can also formulate more refined power consumption strategies through it. Power providers can formulate more reasonable electricity price policies by digging deeper into more accurate and finer-grained elect...

Embodiment 4

[0109] Figure 4 It is a schematic structural diagram of an attack detection system for a privacy-protected cyber-physical system provided by an embodiment of the present application.

[0110] Such as Figure 4 As shown, the attack detection system for privacy-protected cyber-physical systems provided by the embodiment of the present application includes a system controller 401 and a control terminal 402;

[0111] The control terminal 402 is used to convert the real-time data collected by the monitoring terminal 403 into noise-added aggregated data based on the differential privacy mechanism, perform preset nonlinear transformation on the noise-added aggregated data to obtain the aggregated data to be transmitted, and pass the aggregated data to be transmitted through the network communication channel issue;

[0112] The system controller 401 is used to optimally estimate the aggregation data at the current moment based on the Kalman filter to obtain the optimal estimation v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack detection method, an attack detection system, an attack detection device and attack detection equipment for a privacy protection-oriented information physical system, and a computer readable storage medium. To-be-transmitted aggregated data obtained by performing preset nonlinear transformation on noise-added aggregated data generated based on a differential privacy mechanism is transmitted through a network communication channel, and a data receiving end performs inverse transformation of the preset nonlinear transformation on the received first aggregated data to obtain second aggregated data, and performing optimal estimation on the aggregation data at the current moment based on Kalman filtering according to the second aggregation data to obtain an estimation residual error of an optimal estimation value, and performing attack detection, thereby reducing an over-high detection threshold caused by a differential privacy mechanism by increasing the randomness of the real-time aggregation data. Therefore, the problem that an attacker can more easily inject an attack signal by wrong data injection is solved, and a better detection rate is obtained.

Description

technical field [0001] The present application relates to the technical field of network information security, and in particular to an attack detection method, system, device, equipment and computer-readable storage medium for a privacy-protected cyber-physical system. Background technique [0002] Traditional industrial control systems are not interconnected through cyberspace, so their communication intelligence is limited to internal devices. However, the modern industrial infrastructure presents the characteristics of a large number of equipment and a wide distribution range. Therefore, information technology and network communication technology are introduced into the industrial control system, so that the physical process can be monitored and controlled through communication technology, and gradually evolve into a cyber-physical system. Cyber-physical systems can make the integration of measurement, calculation and control more in-depth, so as to perform better real-t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40G06F21/55
CPCY04S40/20
Inventor 杨明吴法宗王鑫吴晓明杨美红王春梅陈振娅穆超
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products