{"title":"Identification for Systems with Binary Data against Piecewise Constant DoS Attacks: A Game Learning Approach","authors":"Chongyuan Hu, Ruizhe Jia, Yanling Zhang, Jin Guo","doi":"10.1109/ICUS55513.2022.9986668","DOIUrl":null,"url":null,"abstract":"This paper proposes a game learning approach for system identification with binary data against piecewise constant DoS (Denial-of-Service) attacks. First, the game model of attack and defense is established, and the strategy sets and payoff functions of the attacker and the defender are given. Then, aiming at the piecewise constant DoS attack, a game learning rule is designed for the defender. Based on the rule, an attack strategy estimation algorithm and a system parameter estimation algorithm are constructed, and their performances are analyzed in a given stage. Finally, the rationality of the theoretical results is verified by numerical simulations.","PeriodicalId":345773,"journal":{"name":"2022 IEEE International Conference on Unmanned Systems (ICUS)","volume":"72 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Unmanned Systems (ICUS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUS55513.2022.9986668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper proposes a game learning approach for system identification with binary data against piecewise constant DoS (Denial-of-Service) attacks. First, the game model of attack and defense is established, and the strategy sets and payoff functions of the attacker and the defender are given. Then, aiming at the piecewise constant DoS attack, a game learning rule is designed for the defender. Based on the rule, an attack strategy estimation algorithm and a system parameter estimation algorithm are constructed, and their performances are analyzed in a given stage. Finally, the rationality of the theoretical results is verified by numerical simulations.