期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
1
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network
2
作者 Yongzhong Li Cong Li +1 位作者 Yuheng Li Shipeng Zhang 《Journal of New Media》 2022年第4期205-217,共13页
In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology o... In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection. 展开更多
关键词 industrial control network security intrusion detection deep learning AutoEncoder three-way decision
下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
3
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 real time ETHERNET multiple access protocol industrial control networks
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部