Event-Triggered Control Systems Under Denial-of-Service Attacks
نویسندگان
چکیده
منابع مشابه
Secure Networked Control Systems under Denial of Service Attacks
This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the netwo...
متن کاملSafe and Secure Networked Control Systems under Denial-of-Service Attacks
We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over a communication network. The packets may be jammed or compromised by a malicious adversary. For a class of denial-of-service (DoS) attack models, the goal is to find an (optimal) causal feedback controller that minimizes a give...
متن کاملDenial of Service Attacks
Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...
متن کاملDenial of Service Attacks
................................................................................................................................................................4
متن کاملDenial-of-Service Attacks
Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-ofservice (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s Internet. The main aim of a DoS is the disruption of services by attempting to limit access to a mac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Control of Network Systems
سال: 2017
ISSN: 2325-5870
DOI: 10.1109/tcns.2016.2613445