期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
1
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon 《Communications and Network》 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System Distributed Denial of service (DDoS) attack Intrusion Detection and Prevention Systems DETECTION Mitigation and Stealthwatch
下载PDF
Central Aggregator Intrusion Detection System for Denial of Service Attacks
2
作者 Sajjad Ahmad Imran Raza +3 位作者 MHasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2023年第2期2363-2377,共15页
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart gr... Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes. 展开更多
关键词 Denial of service attack vehicle to grid network network security network throughput
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
3
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of service attacks) and DoS (Denial of service attacks) DAC (DDoS attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
4
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
Formalized Description of Distributed Denial of Service Attack 被引量:1
5
作者 杜彦辉 马锐 刘玉树 《Journal of Beijing Institute of Technology》 EI CAS 2004年第4期360-364,共5页
The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and... The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.( 展开更多
关键词 distributed) denial of service(DDoS) attack formalized description framework knowledge (expression)
下载PDF
Modeling and Simulation of Low Rate of Denial of Service Attacks
6
《International English Education Research》 2014年第1期31-34,共4页
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using a... The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference. 展开更多
关键词 Low-Rate Denial of service attacks Congestion Control attack Prevention Network Security
下载PDF
Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network
7
作者 Gul Nawaz Muhammad Junaid +5 位作者 Adnan Akhunzada Abdullah Gani Shamyla Nawazish Asim Yaqub Adeel Ahmed Huma Ajab 《Computers, Materials & Continua》 SCIE EI 2023年第11期2157-2178,共22页
Distributed denial of service(DDoS)attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user.We proposed a deep neural network(DNN)model for the detection of DDoS attacks... Distributed denial of service(DDoS)attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user.We proposed a deep neural network(DNN)model for the detection of DDoS attacks in the Software-Defined Networking(SDN)paradigm.SDN centralizes the control plane and separates it from the data plane.It simplifies a network and eliminates vendor specification of a device.Because of this open nature and centralized control,SDN can easily become a victim of DDoS attacks.We proposed a supervised Developed Deep Neural Network(DDNN)model that can classify the DDoS attack traffic and legitimate traffic.Our Developed Deep Neural Network(DDNN)model takes a large number of feature values as compared to previously proposed Machine Learning(ML)models.The proposed DNN model scans the data to find the correlated features and delivers high-quality results.The model enhances the security of SDN and has better accuracy as compared to previously proposed models.We choose the latest state-of-the-art dataset which consists of many novel attacks and overcomes all the shortcomings and limitations of the existing datasets.Our model results in a high accuracy rate of 99.76%with a low false-positive rate and 0.065%low loss rate.The accuracy increases to 99.80%as we increase the number of epochs to 100 rounds.Our proposed model classifies anomalous and normal traffic more accurately as compared to the previously proposed models.It can handle a huge amount of structured and unstructured data and can easily solve complex problems. 展开更多
关键词 Distributed denial of service(DDoS)attacks software-defined networking(SDN) classification deep neural network(DNN)
下载PDF
Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks 被引量:1
8
作者 Bingjing Yan Pengchao Yao +2 位作者 Tao Yang Boyang Zhou Qiang Yang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期41-51,共11页
Electric power grids are evolving into complex cyber-physical power systems(CPPSs)that integrate advanced information and communication technologies(ICTs)but face increasing cyberspace threats and attacks.This study c... Electric power grids are evolving into complex cyber-physical power systems(CPPSs)that integrate advanced information and communication technologies(ICTs)but face increasing cyberspace threats and attacks.This study considers CPPS cyberspace security under distributed denial of service(DDoS)attacks and proposes a nonzero-sum game-theoretical model with incomplete information for appropriate allocation of defense resources based on the availability of limited resources.Task time delay is applied to quantify the expected utility as CPPSs have high time requirements and incur massive damage DDoS attacks.Different resource allocation strategies are adopted by attackers and defenders under the three cases of attack-free,failed attack,and successful attack,which lead to a corresponding consumption of resources.A multidimensional node value analysis is designed to introduce physical and cybersecurity indices.Simulation experiments and numerical results demonstrate the effectiveness of the proposed model for the appropriate allocation of defense resources in CPPSs under limited resource availability. 展开更多
关键词 Game theory complex cyber-physical power system(CPPS) multidimensional evaluation distributed denial of service(DDoS)attack
原文传递
The detection method of low-rate DoS attack based on multi-feature fusion 被引量:3
9
作者 Liang Liu Huaiyuan Wang +1 位作者 Zhijun Wu Meng Yue 《Digital Communications and Networks》 SCIE 2020年第4期504-513,共10页
As a new type of Denial of Service(DoS)attacks,the Low-rate Denial of Service(LDoS)attacks make the traditional method of detecting Distributed Denial of Service Attack(DDoS)attacks useless due to the characteristics ... As a new type of Denial of Service(DoS)attacks,the Low-rate Denial of Service(LDoS)attacks make the traditional method of detecting Distributed Denial of Service Attack(DDoS)attacks useless due to the characteristics of a low average rate and concealment.With features extracted from the network traffic,a new detection approach based on multi-feature fusion is proposed to solve the problem in this paper.An attack feature set containing the Acknowledge character(ACK)sequence number,the packet size,and the queue length is used to classify normal and LDoS attack traffics.Each feature is digitalized and preprocessed to fit the input of the K-Nearest Neighbor(KNN)classifier separately,and to obtain the decision contour matrix.Then a posteriori probability in the matrix is fused,and the fusion decision index D is used as the basis of detecting the LDoS attacks.Experiments proved that the detection rate of the multi-feature fusion algorithm is higher than those of the single-based detection method and other algorithms. 展开更多
关键词 Low-rate denial of service attacks attack features KNN classifier Multi-feature fusion
下载PDF
Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks 被引量:2
10
作者 Ya Zhang Lishuang Du Frank L.Lewis 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1225-1234,共10页
In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels ... In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied.In the communication channels between sensors and a remote estimator,the attacker chooses some channels to randomly jam DoS attacks to make their packets randomly dropped.A stochastic power allocation approach composed of three steps is proposed.Firstly,the minimum number of channels and the channel set to be attacked are given.Secondly,a necessary condition and a sufficient condition on the packet loss probabilities of the channels in the attack set are provided for general and special systems,respectively.Finally,by converting the original coupling nonlinear programming problem to a linear programming problem,a method of searching attack probabilities and power to minimize the attack energy is proposed.The effectiveness of the proposed scheme is verified by simulation examples. 展开更多
关键词 attack allocation denial of service(DoS)attack packet loss remote estimation sensor networks
下载PDF
Vulnerability Assessment of Distributed Load Shedding Algorithm for Active Distribution Power System Under Denial of Service Attack
11
作者 Weiwei Xu Jiaming Weng +4 位作者 Boliang Lou Xiaoming Huang Hongyang Huang Jun Wu Dan Zhou 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第6期2066-2075,共10页
In order to deal with frequency deviation andsupply-demand imbalance in active distribution power system, inthis paper a distributed under frequency load shedding (UFLS)strategy is proposed. Different from conventiona... In order to deal with frequency deviation andsupply-demand imbalance in active distribution power system, inthis paper a distributed under frequency load shedding (UFLS)strategy is proposed. Different from conventional centralizedUFLS schemes, no centralized master station gathering all thebuses’ information is required. Instead, each bus decides itsown load shedding amount by only relying on limited peer-topeer communication. However, such UFLS strategy may sufferfrom some unexpected cyber-attacks such as integrity attacksand denial of service (DoS) attack. The latter DoS attack aimsto degrade the system performance by jamming or breakingthe communication, which is of high probability to happen inpractical power system. To assess the vulnerability of proposeddistributed UFLS algorithm, the effect of DoS attack on distributed average consensus algorithm is theoretically derived,which indicates that the final consensus value can be estimatedby a given attack probability. It is also investigated that such DoSattack does harm to the load shedding amount and finally affectsthe system frequency performance in the active distributionpower system. Several case studies implemented on an IEEE33-bus active distribution power system are conducted to verifythe effectiveness of the theoretical findings and investigate thevulnerability of the considered power system. 展开更多
关键词 Active distribution power system cyber security denial of service attack distributed average consensus load shedding
原文传递
Packet track and traceback mechanism against denial of service attacks 被引量:2
12
作者 LI Li SHEN Su-bin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第3期51-58,共8页
The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and t... The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme. 展开更多
关键词 denial of service (DoS) attack TRACEBACK packet marking Pi
原文传递
R-IDPS: Real Time SDN-Based IDPS System for IoT Security
13
作者 Noman Mazhar Rosli Saleh +3 位作者 Reza Zaba Muhammad Zeeshan M.Muzaffar Hameed Nauman Khan 《Computers, Materials & Continua》 SCIE EI 2022年第11期3099-3118,共20页
The advent of the latest technologies like the Internet of things(IoT)transforms the world from a manual to an automated way of lifestyle.Meanwhile,IoT sector open numerous security challenges.In traditional networks,... The advent of the latest technologies like the Internet of things(IoT)transforms the world from a manual to an automated way of lifestyle.Meanwhile,IoT sector open numerous security challenges.In traditional networks,intrusion detection and prevention systems(IDPS)have been the key player in the market to ensure security.The challenges to the conventional IDPS are implementation cost,computing power,processing delay,and scalability.Further,online machine learning model training has been an issue.All these challenges still question the IoT network security.There has been a lot of research for IoT based detection systems to secure the IoT devices such as centralized and distributed architecture-based detection systems.The centralized system has issues like a single point of failure and load balancing while distributed system design has scalability and heterogeneity hassles.In this study,we design and develop an agent-based hybrid prevention system based on software-defined networking(SDN)technology.The system uses lite weight agents with the ability to scaleup for bigger networks and is feasible for heterogeneous IoT devices.The baseline profile for the IoT devices has been developed by analyzing network flows from all the IoT devices.This profile helps in extracting IoT device features.These features help in the development of our dataset that we use for anomaly detection.For anomaly detection,support vector machine has been used to detect internet control message protocol(ICMP)flood and transmission control protocol synchronize(TCP SYN)flood attacks.The proposed system based on machine learning model is fully capable of online and offline training.Other than detection accuracy,the system can fully mitigate the attacks using the software-defined technology SDN technology.The major goal of the research is to analyze the accuracy of the hybrid agent-based intrusion detection systems as compared to conventional centralized only solutions,especially under the flood attack conditions generated by the distributed denial of service(DDoS)attacks.The system shows 97%to 99%accuracy in simulated results with no false-positive alarm.Also,the system shows notable improvement in terms of resource utilization and performance under attack scenarios. The R-IDPS is scalable, and thesystem is suitable for heterogeneous IoT devices and networks. 展开更多
关键词 Machine learning Internet of things software defined networking distributed denial of service attacks
下载PDF
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:defense scheme and its optimality
14
作者 Jin Guo Xuebin Wang +2 位作者 Yanling Zhang Wenchao Xue Yanlong Zhao 《Control Theory and Technology》 EI CSCD 2022年第1期114-126,共13页
In this paper,we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations.By estimatin... In this paper,we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations.By estimating the key parameters of the joint attack and compensating them in the identification algorithm,a compensation-oriented defense scheme is proposed.Then the identification algorithm of system parameter is designed and is further proved to be consistent.The asymptotic normality of the algorithm is obtained,and on this basis,we propose the optimal defense scheme.Furthermore,the implementation of the optimal defense scheme is discussed.Finally,a simulation example is presented to verify the effectiveness of the main results. 展开更多
关键词 System identification Denial of service attack Data tampering attack Defense scheme
原文传递
HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework
15
作者 Magdy M.Fadel Sally M.El-Ghamrawy +2 位作者 Amr M.T.Ali-Eldin Mohammed K.Hassan Ali I.El-Desoky 《Computers, Materials & Continua》 SCIE EI 2022年第11期2293-2312,共20页
Distributed denial-of-service(DDoS)attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks.Furthermore,the enormous number of connected devices makes it d... Distributed denial-of-service(DDoS)attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks.Furthermore,the enormous number of connected devices makes it difficult to operate such a network effectively.Software defined networks(SDN)are networks that are managed through a centralized control system,according to researchers.This controller is the brain of any SDN,composing the forwarding table of all data plane network switches.Despite the advantages of SDN controllers,DDoS attacks are easier to perpetrate than on traditional networks.Because the controller is a single point of failure,if it fails,the entire network will fail.This paper offers a Hybrid Deep Learning Intrusion Detection and Prevention(HDLIDP)framework,which blends signature-based and deep learning neural networks to detect and prevent intrusions.This framework improves detection accuracy while addressing all of the aforementioned problems.To validate the framework,experiments are done on both traditional and SDN datasets;the findings demonstrate a significant improvement in classification accuracy. 展开更多
关键词 Software defined networks(SDN) distributed denial of service attack(DDoS) signature-based detection whale optimization algorism(WOA) deep learning neural network classifier
下载PDF
Performance of unique and secure routing protocol(USRP)in flying Adhoc Networks for healthcare applications
16
作者 J.Vijitha Ananthi P.Subha Hency Jose 《High-Confidence Computing》 EI 2024年第1期24-31,共8页
Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.I... Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network. 展开更多
关键词 Secure routing protocol Flying Adhoc Networks Unmanned aerial vehicles Mobile Adhoc network attackers Denial of service attacks
原文传递
Resilient distributed economic dispatch of a cyber-power system under DoS attack 被引量:5
17
作者 Feisheng YANG Xuhui LIANG Xiaohong GUAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第1期40-50,共11页
The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization mode... The economic dispatch problem of a smart grid under vicious denial of service(DoS)is the main focus of this paper.Taking the actual situation of power generation as a starting point,a new distributed optimization model is established which takes the environmentai pollution penalty into account.For saving the limited bandwidth,a novel distributed event-triggered scheme is proposed to keep the resilience and economy of a class of cyber-power syst ems when the communication net work is subject to malicious DoS attack.Then an improved multi-agent consensus protocol based on the gradient descent idea is designed to solve the minimization problem,and the prerequisites to minimize the system power generation cost are analyzed from the aspects of optimality and stability.Finally,the theoretical results are verified through a single-area 10-generat or unit simulation. 展开更多
关键词 Economic dispatch Denial of service(DoS)attack Resilient event-triggered scheme Distributed optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部