Novel attack-defense framework for nonlinear complex networks: An important-data-based method

被引:38
|
作者
Wang, Xun [1 ]
Tian, Engang [1 ,3 ]
Wei, Bin [1 ]
Liu, Jinliang [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
IDB attack strategy; nonlinear complex networks (CNs); resilient H8 estimator; INFINITY STATE ESTIMATION; DATA INJECTION ATTACKS; DOS ATTACK; SYSTEMS; DELAY;
D O I
10.1002/rnc.6551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H & INFIN;$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack-defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H & INFIN;$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H & INFIN;$$ {H}_{\infty } $$ estimator, respectively.
引用
收藏
页码:2861 / 2878
页数:18
相关论文
共 50 条
  • [21] A Novel Method Based on Node’s Correlation to Evaluate Important Nodes in Complex Networks
    Lu P.
    Dong C.
    Guo Y.
    Journal of Shanghai Jiaotong University (Science), 2022, 27 (05) : 688 - 698
  • [22] A probabilistic automata-based network attack-defense game model for data security by using security service chain
    Liu, Hao
    Wang, Chong
    Wu, Zhonghai
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 28 (01):
  • [23] Important-Data-Based DoS Attack Mechanism and Resilient H8 Filter Design for Networked T-S Fuzzy Systems
    Wang, Xun
    Tian, Engang
    Zheng, Wei Xing
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (05) : 3352 - 3362
  • [24] Improved Wasserstein Generative Adversarial Networks Defense Method Against Data Integrity Attack on Smart Grid
    Li Y.
    Wang X.
    Zeng J.
    Recent Advances in Electrical and Electronic Engineering, 2022, 15 (03): : 243 - 254
  • [25] Improved Wasserstein Generative Adversarial Networks Defense Method Against Data Integrity Attack on Smart Grid
    Li, Yuancheng
    Wang, Xiao
    Zeng, Jing
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2022, 15 (03) : 243 - 254
  • [26] Sequential Node Attack of Complex Networks based on Q-learning Method
    Ma, Weijun
    Fang, Junyuan
    Wu, Jiajing
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [27] Security defense decision method based on potential differential game for complex networks
    Zhang, Hengwei
    Mi, Yan
    Fu, Yumeng
    Liu, Xiaohu
    Zhang, Yuchen
    Wang, Jindong
    Tan, Jinglei
    COMPUTERS & SECURITY, 2023, 129
  • [28] An integrated graph data privacy attack framework based on graph neural networks in IoT
    Zhao, Xiaoran
    Peng, Changgen
    Ding, Hongfa
    Tan, Weijie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20):
  • [29] Dynamic identification of important nodes in complex networks based on the KPDN–INCC method
    Jieyong Zhang
    Liang Zhao
    Peng Sun
    Wei Liang
    Scientific Reports, 14
  • [30] VFedAD: A Defense Method Based on the Information Mechanism Behind the Vertical Federated Data Poisoning Attack
    Lai, Jinrong
    Wang, Tong
    Chen, Chuan
    Li, Yihao
    Zheng, Zibin
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 1148 - 1157