This Paper:Browse 758 Download 0 |
码上扫一扫! |
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality |
JinGuo1,2,XuebinWang1,2,YanlingZhang1,2,WenchaoXue3,YanlongZhao3 |
|
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences) |
|
摘要: |
In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results. |
关键词: System identification · Denial of service attack · Data tampering attack · Defense scheme |
DOI:https://doi.org/10.1007/s11768-021-00074-8 |
|
基金项目:This research was supported by the National Key Research and Development Program of China (2018YFA0703801), the National Natural Science Foundation of China (62173030, 62033010). |
|
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality |
Jin Guo1,2,Xuebin Wang1,2,Yanling Zhang1,2,Wenchao Xue3,Yanlong Zhao3 |
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences) |
Abstract: |
In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results. |
Key words: System identification · Denial of service attack · Data tampering attack · Defense scheme |