基于双层Stackelberg博弈的欺骗和DoS攻击下交换系统的主动安全控制

IF 10.5 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Lili Li;Yecheng Li;Jie Lian;Mengjie Li
{"title":"基于双层Stackelberg博弈的欺骗和DoS攻击下交换系统的主动安全控制","authors":"Lili Li;Yecheng Li;Jie Lian;Mengjie Li","doi":"10.1109/TCYB.2025.3561686","DOIUrl":null,"url":null,"abstract":"This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 7","pages":"3251-3261"},"PeriodicalIF":10.5000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Active Security Control for Switched Systems Under Deception and DoS Attacks Based on Two-Tier Stackelberg Game\",\"authors\":\"Lili Li;Yecheng Li;Jie Lian;Mengjie Li\",\"doi\":\"10.1109/TCYB.2025.3561686\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"55 7\",\"pages\":\"3251-3261\"},\"PeriodicalIF\":10.5000,\"publicationDate\":\"2025-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10985814/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10985814/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文深入研究了网络交换系统(nss)在面对欺骗攻击和拒绝服务(DoS)攻击时所带来的安全控制挑战。它采用主动的视角,提出了一种增强的双层Stackelberg博弈方法来影响欺骗攻击者、控制器和DoS攻击者的行为。通过制定这三个参与者的成本函数,它寻求得出最优解决方案和各自最优策略之间的相互作用。同时考虑了两种复杂情况:欺骗攻击篡改切换信号导致系统与控制器之间的异步行为;系统的开环运行是由于DoS攻击阻塞了控制器的输出。在两层多攻击者Stackelberg博弈方法和平均停留时间技术的联合设计中,在保证系统均方指数稳定性的同时,揭示了欺骗攻击、DoS攻击和异步切换行为之间的定量关系。最后,通过开关RLC电路的仿真验证了所提出的主动安全控制方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Active Security Control for Switched Systems Under Deception and DoS Attacks Based on Two-Tier Stackelberg Game
This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Cybernetics
IEEE Transactions on Cybernetics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, CYBERNETICS
CiteScore
25.40
自引率
11.00%
发文量
1869
期刊介绍: The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信