首页> 外文OA文献 >Identifying cyber attacks via local model information
【2h】

Identifying cyber attacks via local model information

机译:通过本地模型信息识别网络攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This work considers the problem of detecting corrupted components in a large scale decentralized system via local model information. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which external (cyber) attacks have become an important threat. We consider the case of linear networks, and we model a cyber attack as an exogenous input that compromises the behavior of a set of components. We exploit two distributed methods that rely on two different sets of assumptions to achieve detection and identification. The first method takes advantage of the presence in the network of weakly interconnected subparts, it requires limited knowledge of the network model, and it affords local detection and identification of misbehaving components whose behavior deviates more than a threshold. The second method relies on the presence of a set of trustworthy leaders with better computation and communication capabilities. Only relying on a partial knowledge of the network model, the leaders cooperatively detect and identify misbehaving components.
机译:这项工作考虑了通过本地模型信息检测大规模分散系统中损坏的组件的问题。电力系统,运输系统以及通常的任何计算机或网络系统都是大规模系统的示例,外部(网络)攻击已成为大规模系统的重要威胁。我们考虑线性网络的情况,并将网络攻击建模为损害一组组件行为的外来输入。我们利用两种基于两种不同假设的分布式方法来实现检测和识别。第一种方法利用了网络中互连程度较弱的子部件的存在,它要求对网络模型的了解有限,并且可以对行为偏离阈值以上的行为异常的组件进行本地检测和识别。第二种方法依赖于一组具有更好的计算和通信功能的可信任领导者的存在。领导者仅依靠对网络模型的部分了解,就可以协作地检测和识别行为异常的组件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号