具有二值观测值的 FIR 系统的篡改攻击检测和参数识别:输入设计方法

IF 3.7 2区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
{"title":"具有二值观测值的 FIR 系统的篡改攻击检测和参数识别:输入设计方法","authors":"","doi":"10.1016/j.nahs.2024.101529","DOIUrl":null,"url":null,"abstract":"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>","PeriodicalId":49011,"journal":{"name":"Nonlinear Analysis-Hybrid Systems","volume":null,"pages":null},"PeriodicalIF":3.7000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach\",\"authors\":\"\",\"doi\":\"10.1016/j.nahs.2024.101529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>\",\"PeriodicalId\":49011,\"journal\":{\"name\":\"Nonlinear Analysis-Hybrid Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nonlinear Analysis-Hybrid Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1751570X24000669\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nonlinear Analysis-Hybrid Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1751570X24000669","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了具有二值观测值的有限脉冲响应(FIR)系统中的数据篡改攻击检测和系统参数识别问题。无需获取与系统相关的先验信息,也无需对数据进行添加水印或加密等操作,本文提出了一种使用输入设计的检测和识别联合算法。该算法可以检测系统中潜在的数据篡改攻击,同时实现系统参数的一致识别。随后,介绍了一对用于评估算法检测性能的指标,即漏检率和误检率,并给出了这两个指标的近似表达式,然后讨论了数据长度和检测阈值对这些指标的影响。最后,进行了数值模拟,以验证所获得的结论和讨论结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach

This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Nonlinear Analysis-Hybrid Systems
Nonlinear Analysis-Hybrid Systems AUTOMATION & CONTROL SYSTEMS-MATHEMATICS, APPLIED
CiteScore
8.30
自引率
9.50%
发文量
65
审稿时长
>12 weeks
期刊介绍: Nonlinear Analysis: Hybrid Systems welcomes all important research and expository papers in any discipline. Papers that are principally concerned with the theory of hybrid systems should contain significant results indicating relevant applications. Papers that emphasize applications should consist of important real world models and illuminating techniques. Papers that interrelate various aspects of hybrid systems will be most welcome.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信