{"title":"用于负载频率控制的间隔安全事件触发机制 主动防御 DoS 攻击","authors":"Zihao Cheng;Songlin Hu;Dong Yue;Xuhui Bu;Xiaolong Ruan;Chenggang Xu","doi":"10.1109/TCYB.2024.3488208","DOIUrl":null,"url":null,"abstract":"This study proposes an active defense strategy against denial-of-service (DoS) attacks to address the secure event-triggered control of multiarea load frequency control (LFC) systems. A novel interval secure event-triggered mechanism (ISETM) is introduced, integrating event-triggered control with cybersecurity mechanisms under the software defined network (SDN) framework. ISETM generates not only a triggering instant but also a secure triggering interval (STI) simultaneously. The STI sent to the SDN control plane is an estimation time interval generated by the Taylor expansion and model-based prediction method. During this interval, the SDN control plane programs OpenFlow switches to filter attack traffics, ensuring delayed but secure triggering transmission. Under ISETM conditions represented by two systems of inequalities, a multiarea LFC system is modeled as a delay system incorporating a triggering error based on the Taylor expansion. To achieve <inline-formula> <tex-math>$H_{\\infty }$ </tex-math></inline-formula> performance of the established LFC system, a criterion is derived using the Lyapunov-Krasovskii functional method. A codesign approach is provided to solve the proposed ISETM control (ISETC) gains through linear matrix inequality (LMI) techniques. Finally, simulations validate the effectiveness and advantages of our proposed method.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 2","pages":"981-994"},"PeriodicalIF":9.4000,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Interval Secure Event-Triggered Mechanism for Load Frequency Control Active Defense Against DoS Attack\",\"authors\":\"Zihao Cheng;Songlin Hu;Dong Yue;Xuhui Bu;Xiaolong Ruan;Chenggang Xu\",\"doi\":\"10.1109/TCYB.2024.3488208\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study proposes an active defense strategy against denial-of-service (DoS) attacks to address the secure event-triggered control of multiarea load frequency control (LFC) systems. A novel interval secure event-triggered mechanism (ISETM) is introduced, integrating event-triggered control with cybersecurity mechanisms under the software defined network (SDN) framework. ISETM generates not only a triggering instant but also a secure triggering interval (STI) simultaneously. The STI sent to the SDN control plane is an estimation time interval generated by the Taylor expansion and model-based prediction method. During this interval, the SDN control plane programs OpenFlow switches to filter attack traffics, ensuring delayed but secure triggering transmission. Under ISETM conditions represented by two systems of inequalities, a multiarea LFC system is modeled as a delay system incorporating a triggering error based on the Taylor expansion. To achieve <inline-formula> <tex-math>$H_{\\\\infty }$ </tex-math></inline-formula> performance of the established LFC system, a criterion is derived using the Lyapunov-Krasovskii functional method. A codesign approach is provided to solve the proposed ISETM control (ISETC) gains through linear matrix inequality (LMI) techniques. Finally, simulations validate the effectiveness and advantages of our proposed method.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"55 2\",\"pages\":\"981-994\"},\"PeriodicalIF\":9.4000,\"publicationDate\":\"2024-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10758306/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10758306/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Interval Secure Event-Triggered Mechanism for Load Frequency Control Active Defense Against DoS Attack
This study proposes an active defense strategy against denial-of-service (DoS) attacks to address the secure event-triggered control of multiarea load frequency control (LFC) systems. A novel interval secure event-triggered mechanism (ISETM) is introduced, integrating event-triggered control with cybersecurity mechanisms under the software defined network (SDN) framework. ISETM generates not only a triggering instant but also a secure triggering interval (STI) simultaneously. The STI sent to the SDN control plane is an estimation time interval generated by the Taylor expansion and model-based prediction method. During this interval, the SDN control plane programs OpenFlow switches to filter attack traffics, ensuring delayed but secure triggering transmission. Under ISETM conditions represented by two systems of inequalities, a multiarea LFC system is modeled as a delay system incorporating a triggering error based on the Taylor expansion. To achieve $H_{\infty }$ performance of the established LFC system, a criterion is derived using the Lyapunov-Krasovskii functional method. A codesign approach is provided to solve the proposed ISETM control (ISETC) gains through linear matrix inequality (LMI) techniques. Finally, simulations validate the effectiveness and advantages of our proposed method.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.