Novel attack-defense framework for nonlinear complex networks: An important-data-based method

被引:38
|
作者
Wang, Xun [1 ]
Tian, Engang [1 ,3 ]
Wei, Bin [1 ]
Liu, Jinliang [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
IDB attack strategy; nonlinear complex networks (CNs); resilient H8 estimator; INFINITY STATE ESTIMATION; DATA INJECTION ATTACKS; DOS ATTACK; SYSTEMS; DELAY;
D O I
10.1002/rnc.6551
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the state estimation problem for a class of nonlinear complex networks (CNs) under attack. First, a novel important-data-based (IDB) attack strategy is skillfully proposed from the adversary's point of view to maximize the attack effect. Different from most existing attack models, the IDB attacker has the ability to eavesdrop measurements and only attacks the packets which play an important role in the system. As such, a larger system performance degradation can be expected. Second, a new kind of resilient H & INFIN;$$ {H}_{\infty } $$ estimator is designed, from the perspective of the defenders, to alleviate the negative effect of the attack. In a word, a novel unified attack-defense framework for nonlinear CNs is established. In order to make up for the defect that the IDB attacker's parameter is unknown to the defender, an algorithm is developed to approximate the attack parameter. With the help of the Lyapunov functional method, sufficient conditions are obtained to resist the proposed IDB attack and ensure the H & INFIN;$$ {H}_{\infty } $$ performance of the augmented system. At last, two examples are given to demonstrate the destructiveness of the proposed IDB attack strategy and the effectiveness of the developed resilient H & INFIN;$$ {H}_{\infty } $$ estimator, respectively.
引用
收藏
页码:2861 / 2878
页数:18
相关论文
共 50 条
  • [41] Finding Influencers in Complex Networks: A Novel Method Based on Information Theory
    Hu, Yanli
    Li, Jichao
    Ruan, Yirun
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 3372 - 3380
  • [42] A Novel Similarity-Based Method for Link Prediction in Complex Networks
    Rai, Abhay Kumar
    Yadav, Rahul Kumar
    Tripathi, Shashi Prakash
    Singh, Pawan
    Sharma, Apurva
    INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2023, PT II, 2024, 14532 : 309 - 318
  • [43] Research on the construction method of complex fracture networks based on microseismic data
    Wang, Xulin
    Lv, Minghui
    GEOENERGY SCIENCE AND ENGINEERING, 2025, 246
  • [44] A Novel Marine Big Data Analysis Framework Based on Complex Network Theory
    Du, Xiangjun
    Xing, Chunxiao
    Shao, Fengjing
    Sun, Rencheng
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 186 - 191
  • [45] A Novel Important Node Discovery Algorithm Based on Local Community Aggregation and Recognition in Complex Networks
    Qu-zhi Huang
    International Journal of Wireless Information Networks, 2020, 27 : 253 - 260
  • [46] Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
    Saeedi, Iman Dakhil Idan
    Al-Qurabat, Ali Kadhum M.
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (04) : 875 - 886
  • [47] A Novel Important Node Discovery Algorithm Based on Local Community Aggregation and Recognition in Complex Networks
    Huang, Qu-zhi
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (02) : 253 - 260
  • [48] IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks
    Fan, Qiyuan
    Li, Xue
    Wang, Puming
    Jin, Xin
    Yao, Shaowen
    Miao, Shengfa
    An, Min
    Zhao, Yuqing
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [49] Novel multimodal data fusion soft sensor modeling framework based on meta-learning networks for complex chemical process
    Gao Xiaoyong
    Liu Yanchao
    Xie Yi
    Huang Dexian
    IFAC PAPERSONLINE, 2022, 55 (07): : 839 - 844
  • [50] Website defense strategy selection method based on attack-defense game and Monte Carlo simulation; [基于攻防博弈和蒙特卡洛模拟的网站防御策略选取方法]
    Wu H.
    Fan J.
    Lai C.
    Liu J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (08): : 48 - 55