期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems:Three Case Studies 被引量:1
1
作者 PANG Zhonghua FU Yuan +1 位作者 GUO Haibin SUN Jian 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第4期1407-1422,共16页
This paper mainly investigates the security problem of a networked control system based on a Kalman filter.A false data injection attack scheme is proposed to only tamper the measurement output,and its stealthiness an... This paper mainly investigates the security problem of a networked control system based on a Kalman filter.A false data injection attack scheme is proposed to only tamper the measurement output,and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender.Firstly,it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge.Secondly,it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker.Thirdly,the stealthiness condition of the proposed attack scheme based on an inaccurate model is given.Furthermore,for each case,the instability conditions of the closed-loop system under attack are derived.Finally,simulation results are provided to test the proposed attack scheme. 展开更多
关键词 False data injection attack networked control systems(NCSs) stability stealthiness
原文传递
Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems:A Stochastic Coding Scheme 被引量:1
2
作者 GUO Haibin PANG Zhonghua +1 位作者 SUN Jian LI Jun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2022年第5期1668-1684,共17页
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector wi... This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector without other defensive measures.To detect such a class of FDI attacks,a stochastic coding scheme,which codes the sensor measurement with a Gaussian stochastic signal at the sensor side,is proposed to assist an anomaly detector to expose the FDI attack.In order to ensure the system performance in the normal operational context,a decoder is adopted to decode the coded sensor measurement when received at the controller side.With this detection scheme,the residual under the attack can be significantly different from that in the normal situation,and thus trigger an alarm.The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate.To minimize the trace of the coding signal covariance,the design problem of the coding signal is converted into a constraint non-convex optimization problem,and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance.A numerical example is given to verify the effectiveness of the proposed scheme. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) stealthy FDI attacks stochastic coding
原文传递
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:4
3
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(FDI)attacks remote state estimation stealthy attacks
下载PDF
Calcium-Doped Boron Nitride Aerogel Enables Infrared Stealth at High Temperature Up to 1300℃ 被引量:3
4
作者 Mengya Zhu Guangyong Li +2 位作者 Wenbin Gong Lifeng Yan Xuetong Zhang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第1期295-306,共12页
Boron nitride(BN)aerogels,composed of nanoscale BN building units together with plenty of air in between these nanoscale building units,are ultralight ceramic materials with excellent thermal/electrical insulation,gre... Boron nitride(BN)aerogels,composed of nanoscale BN building units together with plenty of air in between these nanoscale building units,are ultralight ceramic materials with excellent thermal/electrical insulation,great chemical stability and high-temperature oxidation resistance,which offer considerable advantages for various applications under extreme conditions.However,previous BN aerogels cannot resist high temperature above 900℃ in air atmosphere,and hightemperature oxidation resistance enhancement for BN aerogels is still a great challenge.Herein,a calcium-doped BN(Ca-BN)aerogel with enhanced high-temperature stability(up to~1300℃ in air)was synthesized by introducing Ca atoms into crystal structure of BN building blocks via high-temperature reaction between calcium phosphate and melamine diborate architecture.Such Ca-BN aerogels could resist the burning of butane flame(~1300℃)and keep their megashape and microstructure very well.Furthermore,Ca-BN aerogel serves as thermal insulation layer,together with Al foil serving as both low-infrared-emission layer and high-infrared-reflection layer,forming a combination structure that can effectively hide high-temperature target(heated by butane flame).Such successful chemical doping of metal element into crystal structure of BN may be helpful in the future design and fabrication of advanced BN aerogel materials,and further extending their possible applications to extremely high-temperature environments. 展开更多
关键词 AEROGEL Boron nitride Calcium doping Infrared stealthy Butane flame
下载PDF
NIR-activated nanosystems with self-modulated bacteria targeting for enhanced biofilm eradication and caries prevention
5
作者 Yunjian Yu Yufei Zhang +9 位作者 Yijie Cheng Yuxia Wang Zeyuan Chen Haonan Sun Xiaosong Wei Zhuang Ma Jie Li Yayun Bai Zhongming Wu Xinge Zhang 《Bioactive Materials》 SCIE 2022年第7期269-285,共17页
The efficacious delivery of antimicrobial drugs to intractable oral biofilms remains a challenge due to inadequate biofilm penetration and lack of pathogen targeting.Herein,we have developed a microenvironment-activat... The efficacious delivery of antimicrobial drugs to intractable oral biofilms remains a challenge due to inadequate biofilm penetration and lack of pathogen targeting.Herein,we have developed a microenvironment-activated poly(ethylene glycol)(PEG)-sheddable nanoplatform to mediate targeted delivery of drugs into oral biofilms for the efficient prevention of dental caries.The PEGylated nanoplatform with enhanced biofilm penetration is capable of deshielding the PEG layer under slightly acidic conditions in a PEG chain length-dependent manner to re-expose the bacteria-targeting ligands,thereby facilitating targeted codelivery of ciprofloxacin(CIP)and IR780 to the bacteria after accumulation within biofilms.The nanoplatform tends to induce bacterial agglomeration and suffers from degradation in the acidic oral biofilm microenvironment,triggering rapid drug release on demand around bacterial cells.The self-modulating nanoplatform under near-infrared(NIR)irradiation accordingly displays greatly augmented potency in oral biofilm penetration and disruption compared with drugs alone.Topical oral treatment with nanoplatforms involving synergetic pharmacological and photothermal/photodynamic trinary therapy results in robust biofilm dispersion and efficacious suppression of severe tooth decay in rats.This versatile nanoplatform can promote local accumulation and specific drug transport into biofilms and represents a new paradigm for targeted drug delivery for the management of oral biofilm-associated infections. 展开更多
关键词 Bioresponsive materials Oral biofilm stealthy”corona Self-modulating Targeted drug delivery
原文传递
PathMarker:protecting web contents against inside crawlers
6
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 CSCD 2019年第1期100-116,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism stealthy distributed inside crawler Confidential Website content protection
原文传递
PathMarker:protecting web contents against inside crawlers
7
作者 Shengye Wan Yue Li Kun Sun 《Cybersecurity》 2018年第1期375-391,共17页
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanis... Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler developers and crawler defenders.In this paper,based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviours,we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers.By adding a marker to each Uniform Resource Locator(URL),we can trace the page that leads to the access of this URL and the user identity who accesses this URL.With this supporting information,we can not only perform more accurate heuristic detection using the path related features,but also develop a Support Vector Machine based machine learning detection model to distinguish malicious crawlers from normal users via inspecting their different patterns of URL visiting paths and URL visiting timings.In addition to effectively detecting crawlers at the earliest stage,PathMarker can dramatically suppress the scraping efficiency of crawlers before they are detected.We deploy our approach on an online forum website,and the evaluation results show that PathMarker can quickly capture all 6 open-source and in-house crawlers,plus two external crawlers(i.e.,Googlebots and Yahoo Slurp). 展开更多
关键词 Anti-Crawler mechanism stealthy distributed inside crawler Confidential Website content protection
原文传递
Base communication model of IP covert timing channels 被引量:1
8
作者 Changda WANG Yulin YUAN Lei HUANG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第6期1130-1141,共12页
IP covert timing channel (IPCTC) is an unconventional communication channel which attaches time information to the packets of an overt channel as messages carders, e.g., using different inter-packet delays to transm... IP covert timing channel (IPCTC) is an unconventional communication channel which attaches time information to the packets of an overt channel as messages carders, e.g., using different inter-packet delays to transmit messages in a packet-switched network. Although the IPCTCs have many different communication methods, based on the concept of time, we categorized the base communication model of the IPCTCs into three types and then utilized the signal processing theory to build their mathematical models. As a result, the basic characteristics of the IPCTCs' base model were formally derived. Hence, the characteristics of any IPCTC can be derived from the base models that consist of the IPCTC. Furthermore, a set of approaches was devised to implement the base model of the IPCTCs in a TCP/IP network. Experimental results show the correctness of the pro- posed base model of the IPCTCs in this paper. 展开更多
关键词 network timing channel base communication model BANDWIDTH error rate stealthiness
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部