首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Motif-based resiliency assessment for cyber-physical power systems under various hazards 基于motif的各种灾害下网络物理电力系统弹性评估
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-17 DOI: 10.1049/cps2.12103
Hamed M. Binqadhi, Mohammed M. AlMuhaini, H. Vincent Poor, David Flynn, Hao Huang

Cyber-physical power systems (CPPS) are integral to meeting society's demand for secure, sustainable, affordable and resilient critical networks and services. Given the convergence of decarbonising, heating, cooling, and transportation networks onto cyber-physical power systems (CPPS), this takes on increased significance. This paper introduces an innovative approach to the open challenge of how we evaluate CPPS resilience, presenting the use of network motifs and Monte Carlo simulations. We demonstrate how our methodology enables a comprehensive analysis of CPPS by capturing the interdependence between cyber and physical networks and by accounting for inherent uncertainties in cyber and physical components. Specifically, this method incorporates the dynamic interplay between the physical and cyber networks, presenting a time-dependent motif-based resilience metric. This metric evaluates CPPS performance in maintaining critical loads during and after diverse extreme events in cyber and/or physical layers. The resilience status of the system is determined using the prevalence of 4-node motifs within the system's network, offering valuable redundant paths for critical load supply. The study models a variety of natural events, including earthquakes, windstorms, and tornadoes, along with cyber-attacks while accounting for their inherent uncertainties using Monte Carlo simulation. The proposed approach is demonstrated through two test CPPS, specifically the IEEE 14-bus and IEEE 30-bus test systems, affirming its effectiveness in quantifying CPPS resilience. By comprehensively addressing system dynamics, interdependencies, and uncertainties, the proposed technique advances our understanding of CPPS and supports resilient system design.

网络物理电力系统(CPPS)是满足社会对安全、可持续、经济实惠和弹性关键网络和服务需求的重要组成部分。考虑到脱碳、加热、冷却和运输网络与网络物理电力系统(CPPS)的融合,这一点变得越来越重要。本文介绍了一种创新的方法来应对我们如何评估CPPS弹性的公开挑战,介绍了网络基元和蒙特卡罗模拟的使用。我们展示了我们的方法如何通过捕捉网络和物理网络之间的相互依赖性以及考虑网络和物理组件的固有不确定性来实现对CPPS的全面分析。具体而言,该方法结合了物理网络和网络网络之间的动态相互作用,提出了一种基于时间的基于主题的弹性度量。该指标评估了CPPS在网络和/或物理层发生各种极端事件期间和之后维持关键负载的性能。系统的弹性状态是使用系统网络中4节点主题的流行程度来确定的,为关键负载供应提供了有价值的冗余路径。该研究模拟了各种自然事件,包括地震、风暴和龙卷风,以及网络攻击,同时利用蒙特卡罗模拟计算了它们固有的不确定性。通过两个测试CPPS,即IEEE 14总线和IEEE 30总线测试系统,验证了该方法在量化CPPS弹性方面的有效性。通过全面解决系统动力学、相互依赖性和不确定性,所提出的技术促进了我们对CPPS的理解,并支持弹性系统设计。
{"title":"Motif-based resiliency assessment for cyber-physical power systems under various hazards","authors":"Hamed M. Binqadhi,&nbsp;Mohammed M. AlMuhaini,&nbsp;H. Vincent Poor,&nbsp;David Flynn,&nbsp;Hao Huang","doi":"10.1049/cps2.12103","DOIUrl":"10.1049/cps2.12103","url":null,"abstract":"<p>Cyber-physical power systems (CPPS) are integral to meeting society's demand for secure, sustainable, affordable and resilient critical networks and services. Given the convergence of decarbonising, heating, cooling, and transportation networks onto cyber-physical power systems (CPPS), this takes on increased significance. This paper introduces an innovative approach to the open challenge of how we evaluate CPPS resilience, presenting the use of network motifs and Monte Carlo simulations. We demonstrate how our methodology enables a comprehensive analysis of CPPS by capturing the interdependence between cyber and physical networks and by accounting for inherent uncertainties in cyber and physical components. Specifically, this method incorporates the dynamic interplay between the physical and cyber networks, presenting a time-dependent motif-based resilience metric. This metric evaluates CPPS performance in maintaining critical loads during and after diverse extreme events in cyber and/or physical layers. The resilience status of the system is determined using the prevalence of 4-node motifs within the system's network, offering valuable redundant paths for critical load supply. The study models a variety of natural events, including earthquakes, windstorms, and tornadoes, along with cyber-attacks while accounting for their inherent uncertainties using Monte Carlo simulation. The proposed approach is demonstrated through two test CPPS, specifically the IEEE 14-bus and IEEE 30-bus test systems, affirming its effectiveness in quantifying CPPS resilience. By comprehensively addressing system dynamics, interdependencies, and uncertainties, the proposed technique advances our understanding of CPPS and supports resilient system design.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143362384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards autonomous device protection using behavioural profiling and generative artificial intelligence 使用行为分析和生成式人工智能实现自主设备保护
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-11 DOI: 10.1049/cps2.12102
Sandeep Gupta, Bruno Crispo

Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid proliferation of deployed devices and escalating cyberattacks. Consequently, cybersecurity measures with an improved generalisation that can proactively determine the indicators of compromises to predict 0-day threats or previously unseen malware together with known malware are highly desirable. In this article, the authors present a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and leveraging generative artificial intelligence (genAI) to distinguish between benign and malicious behaviour. The authors design a proof-of-concept for Windows-based computing devices relying on a built-in event tracing mechanism for log collection that is converted into structured data using a graph data structure. The authors extract graph-level features, that is, graph depth, nodes count, number of leaf nodes, node degree statistics, and events count and node-level features (NLF), that is, process start, file create and registry events details for each graph. Further, the authors investigate the use of genAI exploiting a pre-trained large language network—a simple contrastive sentence embedding framework to extract strong features, that is, dense vectors from event graphs. Finally, the authors train a random forest classifier using both the graph-level features and NLF to obtain classification models that are evaluated on a collected dataset containing one thousand benign and malicious samples achieving accuracy up to 99.25%.

考虑到已部署设备的快速扩散和不断升级的网络攻击,对计算设备自主保护的需求不容忽视。因此,网络安全措施具有改进的通用性,可以主动确定妥协指标,以预测零日威胁或以前未见过的恶意软件以及已知的恶意软件是非常可取的。在本文中,作者提出了一种基于行为分析的自主设备保护的新概念,通过持续监测内部资源使用情况并利用生成式人工智能(genAI)来区分良性和恶意行为。作者为基于windows的计算设备设计了一个概念验证,该设备依赖于一个内置的事件跟踪机制,用于使用图形数据结构将日志收集转换为结构化数据。作者提取图级特征,即图深度、节点数、叶节点数、节点度统计和事件数,以及节点级特征(NLF),即每个图的进程启动、文件创建和注册事件详细信息。此外,作者研究了使用genAI利用预训练的大型语言网络-一个简单的对比句子嵌入框架来提取强特征,即从事件图中提取密集向量。最后,作者使用图级特征和NLF训练随机森林分类器来获得分类模型,该模型在包含1000个良性和恶意样本的收集数据集上进行评估,准确率高达99.25%。
{"title":"Towards autonomous device protection using behavioural profiling and generative artificial intelligence","authors":"Sandeep Gupta,&nbsp;Bruno Crispo","doi":"10.1049/cps2.12102","DOIUrl":"10.1049/cps2.12102","url":null,"abstract":"<p>Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid proliferation of deployed devices and escalating cyberattacks. Consequently, cybersecurity measures with an improved generalisation that can proactively determine the indicators of compromises to predict 0-day threats or previously unseen malware together with known malware are highly desirable. In this article, the authors present a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and leveraging generative artificial intelligence (genAI) to distinguish between benign and malicious behaviour. The authors design a proof-of-concept for Windows-based computing devices relying on a built-in event tracing mechanism for log collection that is converted into structured data using a graph data structure. The authors extract graph-level features, that is, <i>graph depth, nodes count, number of leaf nodes, node degree statistics, and events count</i> and node-level features (NLF), that is, <i>process start, file create and registry events details</i> for each graph. Further, the authors investigate the use of genAI exploiting a pre-trained large language network—<i>a simple contrastive sentence embedding framework</i> to extract strong features, that is, dense vectors from event graphs. Finally, the authors train a random forest classifier using both the graph-level features and NLF to obtain classification models that are evaluated on a collected dataset containing one thousand benign and malicious samples achieving accuracy up to 99.25%.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143362801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Winning the battle with cyber risk identification tools in industrial control systems: A review 在工业控制系统中赢得与网络风险识别工具的战斗:综述
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-17 DOI: 10.1049/cps2.12105
Ayo Rotibi, Neetesh Saxena, Pete Burnap

The modern Industrial Control System (ICS) environment now combines information technology (IT), operational technology, and physical processes. This digital transformation enhances operational efficiency, service quality, and physical system capabilities enabling systems to measure and control the physical world. However, it also exposes ICS to new and evolving cybersecurity threats that were once confined to the IT domain. As a result, identifying cyber risks in ICS has become more critical, leading to the development of new methods and tools to tackle these emerging threats. This study reviews some of the latest tools for cyber-risk identification in ICS. It empirically analyses each tool based on specific attributes: focus, application domain, core risk management concepts, and how they address current cybersecurity concerns in ICS.

现代工业控制系统(ICS)环境现在结合了信息技术(IT)、操作技术和物理过程。这种数字化转型提高了操作效率、服务质量和物理系统功能,使系统能够测量和控制物理世界。然而,它也使ICS面临新的和不断发展的网络安全威胁,这些威胁曾经局限于it领域。因此,识别ICS中的网络风险变得更加重要,从而导致开发新的方法和工具来应对这些新出现的威胁。本研究回顾了ICS中网络风险识别的一些最新工具。它根据具体属性对每个工具进行了实证分析:重点、应用领域、核心风险管理概念,以及它们如何解决ICS中当前的网络安全问题。
{"title":"Winning the battle with cyber risk identification tools in industrial control systems: A review","authors":"Ayo Rotibi,&nbsp;Neetesh Saxena,&nbsp;Pete Burnap","doi":"10.1049/cps2.12105","DOIUrl":"10.1049/cps2.12105","url":null,"abstract":"<p>The modern Industrial Control System (ICS) environment now combines information technology (IT), operational technology, and physical processes. This digital transformation enhances operational efficiency, service quality, and physical system capabilities enabling systems to measure and control the physical world. However, it also exposes ICS to new and evolving cybersecurity threats that were once confined to the IT domain. As a result, identifying cyber risks in ICS has become more critical, leading to the development of new methods and tools to tackle these emerging threats. This study reviews some of the latest tools for cyber-risk identification in ICS. It empirically analyses each tool based on specific attributes: focus, application domain, core risk management concepts, and how they address current cybersecurity concerns in ICS.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"350-365"},"PeriodicalIF":0.8,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A three-vector model predicting torque control of permanent magnet synchronous motor with a fixed weight coefficient 定重系数永磁同步电机转矩控制的三向量预测模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-14 DOI: 10.1049/cps2.12104
Xingyu Qu, Chengkun Peng, Peng Lu, Bing Ge, Shuang Zhang, Qinghe Wang, Zhenyang Li

The difficulty of adjusting the weighting coefficients of the cost function in traditional model predictive torque control is addressed by proposing a fixed weighting coefficient three-vector model predictive torque control (FWC-MPTC) strategy. The strategy applies three voltage vectors in a control period. The first voltage vector is selected by a fixed coefficient cost function, the second and third voltage vectors are determined by a cost function that includes only torque and flux, and the third voltage vector is no longer just a traditional zero vector. In addition, to solve the problem of poor disturbance immunity of the speed loop PI controller, an active disturbance rejection controller (ADRC) is introduced in the speed loop, and the error non-linear function in the controller is rewritten into a smoother new function. The proposed control strategy reduces the torque and speed fluctuation of the traditional three-vector model predictive control (TTV-MPTC), improves the robustness of the system, avoids the difficulty of adjusting the weight coefficient in the traditional cost function, and reduces the computational complexity of the cost function.

针对传统模型预测转矩控制中成本函数权重系数难以调整的问题,提出了一种固定权重系数的三向量模型预测转矩控制策略(FWC-MPTC)。该策略在一个控制周期内应用三个电压矢量。第一个电压矢量由一个固定系数的代价函数选择,第二个和第三个电压矢量由一个只包含转矩和磁通的代价函数确定,第三个电压矢量不再仅仅是传统的零矢量。此外,为解决速度环PI控制器抗扰性差的问题,在速度环中引入自抗扰控制器(ADRC),将控制器中的误差非线性函数改写为更平滑的新函数。所提出的控制策略降低了传统三向量模型预测控制(TTV-MPTC)的转矩和速度波动,提高了系统的鲁棒性,避免了传统代价函数中权重系数调整的困难,降低了代价函数的计算复杂度。
{"title":"A three-vector model predicting torque control of permanent magnet synchronous motor with a fixed weight coefficient","authors":"Xingyu Qu,&nbsp;Chengkun Peng,&nbsp;Peng Lu,&nbsp;Bing Ge,&nbsp;Shuang Zhang,&nbsp;Qinghe Wang,&nbsp;Zhenyang Li","doi":"10.1049/cps2.12104","DOIUrl":"10.1049/cps2.12104","url":null,"abstract":"<p>The difficulty of adjusting the weighting coefficients of the cost function in traditional model predictive torque control is addressed by proposing a fixed weighting coefficient three-vector model predictive torque control (FWC-MPTC) strategy. The strategy applies three voltage vectors in a control period. The first voltage vector is selected by a fixed coefficient cost function, the second and third voltage vectors are determined by a cost function that includes only torque and flux, and the third voltage vector is no longer just a traditional zero vector. In addition, to solve the problem of poor disturbance immunity of the speed loop PI controller, an active disturbance rejection controller (ADRC) is introduced in the speed loop, and the error non-linear function in the controller is rewritten into a smoother new function. The proposed control strategy reduces the torque and speed fluctuation of the traditional three-vector model predictive control (TTV-MPTC), improves the robustness of the system, avoids the difficulty of adjusting the weight coefficient in the traditional cost function, and reduces the computational complexity of the cost function.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"509-520"},"PeriodicalIF":0.8,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-mediated self-triggered synchronisation of a general linear multi-agent system over a directed graph 有向图上一般线性多智能体系统的云介导自触发同步
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1049/cps2.12101
Takumi Namba, Kiyotsugu Takaba

The authors propose a self-triggered synchronisation control method of a general high-order linear time-invariant multi-agent system through a cloud repository. In the cloud-mediated self-triggered control, each agent asynchronously accesses the cloud repository to obtain past information about its neighbouring agents. Then, the agent predicts future behaviours of its neighbours as well as of its own and locally determines its next access time to the cloud repository. In the case of a general high-order linear agent dynamics, each agent has to estimate exponential evolution of its trajectory characterised by eigenvalues of a system matrix, which is different from single/double integrator or first-order linear agents. The authors’ proposed method deals with exponential behaviours of the agents by tightly evaluating the bounds on matrix exponentials. Based on these bounds, the authors design the self-triggered controller through a cloud that achieves the bounded state synchronization of the closed-loop system without exhibiting any Zeno behaviours. The effectiveness of the proposed method is demonstrated through the numerical simulation.

提出了一种基于云存储库的通用高阶线性定常多智能体系统的自触发同步控制方法。在以云为中介的自触发控制中,每个代理异步访问云存储库以获取有关其相邻代理的过去信息。然后,代理预测它的邻居和它自己的未来行为,并在本地确定它下一次访问云存储库的时间。在一般的高阶线性智能体动力学中,每个智能体必须估计其轨迹的指数演化,该轨迹以系统矩阵的特征值为特征,这与单/双积分器或一阶线性智能体不同。作者提出的方法通过严密地计算矩阵指数的界来处理智能体的指数行为。基于这些边界,作者通过云设计了自触发控制器,实现了闭环系统的有界状态同步,而不表现出任何芝诺行为。通过数值仿真验证了该方法的有效性。
{"title":"Cloud-mediated self-triggered synchronisation of a general linear multi-agent system over a directed graph","authors":"Takumi Namba,&nbsp;Kiyotsugu Takaba","doi":"10.1049/cps2.12101","DOIUrl":"10.1049/cps2.12101","url":null,"abstract":"<p>The authors propose a self-triggered synchronisation control method of a general high-order linear time-invariant multi-agent system through a cloud repository. In the cloud-mediated self-triggered control, each agent asynchronously accesses the cloud repository to obtain past information about its neighbouring agents. Then, the agent predicts future behaviours of its neighbours as well as of its own and locally determines its next access time to the cloud repository. In the case of a general high-order linear agent dynamics, each agent has to estimate exponential evolution of its trajectory characterised by eigenvalues of a system matrix, which is different from single/double integrator or first-order linear agents. The authors’ proposed method deals with exponential behaviours of the agents by tightly evaluating the bounds on matrix exponentials. Based on these bounds, the authors design the self-triggered controller through a cloud that achieves the bounded state synchronization of the closed-loop system without exhibiting any Zeno behaviours. The effectiveness of the proposed method is demonstrated through the numerical simulation.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"497-508"},"PeriodicalIF":0.8,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The threat of zero-dynamics attack on non-linear cyber-physical systems 非线性网络物理系统的零动态攻击威胁
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1049/cps2.12099
Amir Norouzi Mobarakeh, Mohammad Ataei, Rahmat-Allah Hooshmand

Zero-dynamics attack (ZDA) is a destructive stealthy cyberattack that threatens cyber-physical systems (CPS). The authors have warned about the risk of a cyberattack by introducing a new general ZDA that can be effective and robust in non-linear multiple-input multiple-output CPS. In this proposed attack policy, the adversary extracts the sensor and actuator online data on the network platform. Then, by utilising a state observer and considering specific delay times, the attacker injects a ZDA signal into the actuator channels of the cyber-physical system. As a result, the internal dynamics will diverge from the nominal working region of the controlled cyber-physical system, while the outputs remain close to the actual outputs of the attack-free system. Therefore, this cyberattack can remain stealthy, and it can also be robust against revealing signals. The efficiency of this new attack policy is demonstrated in the simulation results for a continuous stirred tank reactor regarded as a cyber-physical system.

零动态攻击(zero -dynamic attack, ZDA)是一种威胁网络物理系统(CPS)的破坏性隐身网络攻击。作者通过引入一种新的通用ZDA来警告网络攻击的风险,该ZDA在非线性多输入多输出CPS中是有效和稳健的。在该攻击策略中,攻击者在网络平台上提取传感器和执行器的在线数据。然后,通过利用状态观测器并考虑特定的延迟时间,攻击者将ZDA信号注入到网络物理系统的执行器通道中。因此,内部动力学将偏离受控网络物理系统的标称工作区域,而输出仍然接近无攻击系统的实际输出。因此,这种网络攻击可以保持隐身,并且它也可以对暴露的信号保持强大。将连续搅拌釜式反应器作为一个网络物理系统进行仿真,验证了该攻击策略的有效性。
{"title":"The threat of zero-dynamics attack on non-linear cyber-physical systems","authors":"Amir Norouzi Mobarakeh,&nbsp;Mohammad Ataei,&nbsp;Rahmat-Allah Hooshmand","doi":"10.1049/cps2.12099","DOIUrl":"10.1049/cps2.12099","url":null,"abstract":"<p>Zero-dynamics attack (ZDA) is a destructive stealthy cyberattack that threatens cyber-physical systems (CPS). The authors have warned about the risk of a cyberattack by introducing a new general ZDA that can be effective and robust in non-linear multiple-input multiple-output CPS. In this proposed attack policy, the adversary extracts the sensor and actuator online data on the network platform. Then, by utilising a state observer and considering specific delay times, the attacker injects a ZDA signal into the actuator channels of the cyber-physical system. As a result, the internal dynamics will diverge from the nominal working region of the controlled cyber-physical system, while the outputs remain close to the actual outputs of the attack-free system. Therefore, this cyberattack can remain stealthy, and it can also be robust against revealing signals. The efficiency of this new attack policy is demonstrated in the simulation results for a continuous stirred tank reactor regarded as a cyber-physical system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"463-476"},"PeriodicalIF":0.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an efficient dynamic context-based privacy policy deployment model via dual bioinspired Q learning optimisations 基于双生物启发Q学习优化的高效动态基于上下文的隐私策略部署模型设计
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1049/cps2.12100
Namrata Jiten Patel, Ashish Jadhav

A novel context-based privacy policy deployment model enhanced with bioinspired Q-learning optimisations is presented. The model addresses the challenge of maintaining privacy while ensuring data integrity and usability in various settings. Leveraging datasets including Adult (Census Income), Yelp, UC Irvine Machine Learning, and Movie Lens, the authors evaluate the model's performance against state-of-the-art techniques, such as GEF AL, Deep Forest, and Robust Continual Learning. The approach employs Firefly Optimiser (FFO) and Ant Lion Optimiser (ALO) algorithms to dynamically adjust privacy parameters and handle large datasets efficiently. Additionally, Q-learning enables intelligent decision-making and rapid adaptation to changing data and network conditions and scenarios. Evaluation results demonstrate that the model consistently outperforms reference techniques across multiple metrics, including privacy levels, scalability, fidelity, and sensitivity management. By reducing reputational harm, minimising delays, and enhancing network quality, the model offers robust privacy protection without sacrificing data utility. Overall, a dynamic context-based privacy policy deployment approach, enhanced with bioinspired Q-learning optimisations, presents a significant advancement in privacy preservation methods. The combination of ALO, FFO, and Q-learning techniques offers a practical solution to evolving data privacy challenges and enhances flexibility in various use case scenarios.

提出了一种新的基于上下文的隐私策略部署模型,该模型增强了生物启发q学习优化。该模型解决了维护隐私的挑战,同时确保了各种设置下数据的完整性和可用性。利用包括成人(人口普查收入)、Yelp、加州大学欧文分校机器学习和电影镜头在内的数据集,作者根据最先进的技术(如GEF AL、Deep Forest和鲁棒持续学习)评估了模型的性能。该方法采用萤火虫优化器(FFO)和蚂蚁狮子优化器(ALO)算法动态调整隐私参数,有效地处理大型数据集。此外,Q-learning可以实现智能决策,并快速适应不断变化的数据和网络条件和场景。评估结果表明,该模型在多个指标(包括隐私级别、可伸缩性、保真度和敏感性管理)上始终优于参考技术。通过减少声誉损害、最小化延迟和提高网络质量,该模型在不牺牲数据效用的情况下提供了强大的隐私保护。总体而言,一种基于动态上下文的隐私策略部署方法,通过生物启发的Q-learning优化得到增强,在隐私保护方法方面取得了重大进展。ALO、FFO和Q-learning技术的结合为不断变化的数据隐私挑战提供了实用的解决方案,并增强了各种用例场景中的灵活性。
{"title":"Design of an efficient dynamic context-based privacy policy deployment model via dual bioinspired Q learning optimisations","authors":"Namrata Jiten Patel,&nbsp;Ashish Jadhav","doi":"10.1049/cps2.12100","DOIUrl":"10.1049/cps2.12100","url":null,"abstract":"<p>A novel context-based privacy policy deployment model enhanced with bioinspired Q-learning optimisations is presented. The model addresses the challenge of maintaining privacy while ensuring data integrity and usability in various settings. Leveraging datasets including Adult (Census Income), Yelp, UC Irvine Machine Learning, and Movie Lens, the authors evaluate the model's performance against state-of-the-art techniques, such as GEF AL, Deep Forest, and Robust Continual Learning. The approach employs Firefly Optimiser (FFO) and Ant Lion Optimiser (ALO) algorithms to dynamically adjust privacy parameters and handle large datasets efficiently. Additionally, Q-learning enables intelligent decision-making and rapid adaptation to changing data and network conditions and scenarios. Evaluation results demonstrate that the model consistently outperforms reference techniques across multiple metrics, including privacy levels, scalability, fidelity, and sensitivity management. By reducing reputational harm, minimising delays, and enhancing network quality, the model offers robust privacy protection without sacrificing data utility. Overall, a dynamic context-based privacy policy deployment approach, enhanced with bioinspired Q-learning optimisations, presents a significant advancement in privacy preservation methods. The combination of ALO, FFO, and Q-learning techniques offers a practical solution to evolving data privacy challenges and enhances flexibility in various use case scenarios.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"477-496"},"PeriodicalIF":0.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale 一种基于图形嵌入的电力系统网络物理风险自动评估方法,以大规模预防和减轻威胁
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-21 DOI: 10.1049/cps2.12097
Shining Sun, Hao Huang, Emily Payne, Shamina Hossain-McKenzie, Nicholas Jacobs, H. Vincent Poor, Astrid Layton, Katherine Davis

Power systems are facing an increasing number of cyber incidents, potentially leading to damaging consequences to both physical and cyber aspects. However, the development of analytical methods for the study of large-scale power infrastructures as cyber-physical systems is still in its early stages. Drawing inspiration from machine-learning techniques, the authors introduce a method inspired by the principles of graph embedding that is tailored for quantitative risk assessment and the exploration of possible mitigation strategies of large-scale cyber-physical power systems. The primary advantage of the graph embedding approach lies in its ability to generate numerous random walks on a graph, simulating potential access paths. Meanwhile, it enables capturing high-dimensional structures in low-dimensional spaces, facilitating advanced machine-learning applications, and ensuring scalability and adaptability for comprehensive network analysis. By employing this graph embedding-based approach, the authors present a structured and methodical framework for risk assessment in cyber-physical systems. The proposed graph embedding-based risk analysis framework aims to provide a more insightful perspective on cyber-physical risk assessment and situation awareness for power systems. To validate and demonstrate its applicability, the method has been tested on two cyber-physical power system models: the Western System Coordinating Council (WSCC) 9-Bus System and the Illinois 200-Bus System, thereby showing its advantages in enhancing the accuracy of risk analysis and comprehensiveness of situational awareness.

电力系统正面临着越来越多的网络事件,这些事件可能会对物理和网络方面造成破坏性后果。然而,将大型电力基础设施作为信息物理系统进行研究的分析方法尚处于起步阶段。从机器学习技术中获得灵感,作者介绍了一种受图嵌入原理启发的方法,该方法专为定量风险评估和探索大规模网络物理电力系统可能的缓解策略而量身定制。图嵌入方法的主要优点在于它能够在图上生成大量随机游走,模拟潜在的访问路径。同时,它可以在低维空间中捕获高维结构,促进先进的机器学习应用,并确保综合网络分析的可扩展性和适应性。通过采用这种基于图形嵌入的方法,作者提出了一个结构化和有条不紊的框架,用于网络物理系统的风险评估。提出的基于图形嵌入的风险分析框架旨在为电力系统的网络物理风险评估和态势感知提供更有洞察力的视角。为了验证和证明该方法的适用性,在西部系统协调委员会(WSCC) 9-Bus系统和伊利诺伊州200-Bus系统两个网络物理电力系统模型上进行了测试,从而显示了其在提高风险分析准确性和态势感知全面性方面的优势。
{"title":"A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale","authors":"Shining Sun,&nbsp;Hao Huang,&nbsp;Emily Payne,&nbsp;Shamina Hossain-McKenzie,&nbsp;Nicholas Jacobs,&nbsp;H. Vincent Poor,&nbsp;Astrid Layton,&nbsp;Katherine Davis","doi":"10.1049/cps2.12097","DOIUrl":"10.1049/cps2.12097","url":null,"abstract":"<p>Power systems are facing an increasing number of cyber incidents, potentially leading to damaging consequences to both physical and cyber aspects. However, the development of analytical methods for the study of large-scale power infrastructures as cyber-physical systems is still in its early stages. Drawing inspiration from machine-learning techniques, the authors introduce a method inspired by the principles of graph embedding that is tailored for quantitative risk assessment and the exploration of possible mitigation strategies of large-scale cyber-physical power systems. The primary advantage of the graph embedding approach lies in its ability to generate numerous random walks on a graph, simulating potential access paths. Meanwhile, it enables capturing high-dimensional structures in low-dimensional spaces, facilitating advanced machine-learning applications, and ensuring scalability and adaptability for comprehensive network analysis. By employing this graph embedding-based approach, the authors present a structured and methodical framework for risk assessment in cyber-physical systems. The proposed graph embedding-based risk analysis framework aims to provide a more insightful perspective on cyber-physical risk assessment and situation awareness for power systems. To validate and demonstrate its applicability, the method has been tested on two cyber-physical power system models: the <i>Western System Coordinating Council (WSCC) 9-Bus System</i> and the <i>Illinois 200-Bus System</i>, thereby showing its advantages in enhancing the accuracy of risk analysis and comprehensiveness of situational awareness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"435-453"},"PeriodicalIF":0.8,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint safety and security risk analysis in industrial cyber-physical systems: A survey 工业网络物理系统中的联合安全和安保风险分析:调查
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-14 DOI: 10.1049/cps2.12095
Zhicong Sun, Guang Chen, Yulong Ding, Shuang-Hua Yang

Industrial Cyber-Physical Systems (iCPSs) represent a new generation of industrial systems that enable a profound integration of industrial processes and informational spaces, thereby empowering the fourth industrial revolution. iCPSs confront more severe safety and security (S&S) challenges compared to traditional industrial systems. One of the most critical challenges is the joint risk analysis of S&S. Many scholars have devoted their research to this area. However, there is a dearth of literature reviews encapsulating recent advancements, which provides the motivation for this study. The authors review the methodologies in this field, delve into the S&S relationships involved, and propose 12 criteria for evaluating these methods. Furthermore, the current research limitations were analysed and potential directions were suggested for future research.

工业网络物理系统(iCPSs)是新一代工业系统的代表,它实现了工业流程与信息空间的深度融合,从而推动了第四次工业革命。与传统工业系统相比,iCPSs 面临着更为严峻的安全与安保(S&S)挑战。其中最关键的挑战之一就是 S&S 的联合风险分析。许多学者都致力于这一领域的研究。然而,概括最新进展的文献综述却十分匮乏,这为本研究提供了动力。作者回顾了这一领域的方法,深入探讨了其中涉及的 S&S 关系,并提出了评估这些方法的 12 项标准。此外,作者还分析了当前研究的局限性,并提出了未来研究的潜在方向。
{"title":"Joint safety and security risk analysis in industrial cyber-physical systems: A survey","authors":"Zhicong Sun,&nbsp;Guang Chen,&nbsp;Yulong Ding,&nbsp;Shuang-Hua Yang","doi":"10.1049/cps2.12095","DOIUrl":"10.1049/cps2.12095","url":null,"abstract":"<p>Industrial Cyber-Physical Systems (iCPSs) represent a new generation of industrial systems that enable a profound integration of industrial processes and informational spaces, thereby empowering the fourth industrial revolution. iCPSs confront more severe safety and security (S&amp;S) challenges compared to traditional industrial systems. One of the most critical challenges is the joint risk analysis of S&amp;S. Many scholars have devoted their research to this area. However, there is a dearth of literature reviews encapsulating recent advancements, which provides the motivation for this study. The authors review the methodologies in this field, delve into the S&amp;S relationships involved, and propose 12 criteria for evaluating these methods. Furthermore, the current research limitations were analysed and potential directions were suggested for future research.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"334-349"},"PeriodicalIF":0.8,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141343900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience quantification model for cyber-physical power systems 网络物理电力系统复原力量化模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-14 DOI: 10.1049/cps2.12098
Mohammad AlMuhaini

As power grids develop, their structure becomes more complex, multi-dimensional, and digitalised—hence, it is referred to as cyber-physical infrastructure. The sensitivity of grids to extreme cyber and physical events is becoming a hot research topic due to the increasing rate of such events and their catastrophic consequences. To produce accurate and comprehensive measures, modelling and assessing the resilience of power systems must include both the physical and cyber domains. However, resilience quantification models that include both domains have not received sufficient attention. A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. A resilience index is also proposed to measure the resilience levels of local nodes and entire systems, including various factors that contribute to the modelled degradation states. Severe weather conditions were modelled to examine the impact of this category of events on the proposed resilience model.

随着电网的发展,其结构变得更加复杂、多维和数字化,因此被称为网络物理基础设施。由于极端网络和物理事件及其灾难性后果的发生率越来越高,电网对此类事件的敏感性正成为一个热门研究课题。为了得出准确而全面的测量结果,电力系统复原力的建模和评估必须包括物理和网络两个领域。然而,包含这两个领域的复原力量化模型尚未得到足够重视。本文提出了一个新颖的复原力模型和量化框架。该模型基于复原力梯形图,描述了在严重自然或人为事件中网络和物理领域的不同阶段。此外,还提出了一种复原力指数,用于衡量局部节点和整个系统的复原力水平,包括导致模拟退化状态的各种因素。模拟了恶劣天气条件,以研究这类事件对拟议复原力模型的影响。
{"title":"Resilience quantification model for cyber-physical power systems","authors":"Mohammad AlMuhaini","doi":"10.1049/cps2.12098","DOIUrl":"10.1049/cps2.12098","url":null,"abstract":"<p>As power grids develop, their structure becomes more complex, multi-dimensional, and digitalised—hence, it is referred to as cyber-physical infrastructure. The sensitivity of grids to extreme cyber and physical events is becoming a hot research topic due to the increasing rate of such events and their catastrophic consequences. To produce accurate and comprehensive measures, modelling and assessing the resilience of power systems must include both the physical and cyber domains. However, resilience quantification models that include both domains have not received sufficient attention. A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. A resilience index is also proposed to measure the resilience levels of local nodes and entire systems, including various factors that contribute to the modelled degradation states. Severe weather conditions were modelled to examine the impact of this category of events on the proposed resilience model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"454-462"},"PeriodicalIF":0.8,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141338829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1