Flocking Control for Cucker–Smale Model Subject to Denial-of-Service Attacks and Communication Delays
نویسندگان
چکیده
This paper examines the flocking control issue of Cucker–Smale model in presence denial-of-service (DoS) attacks and communication delays. In setting DoS attacks, attacker only obstructs information between agents during activation phases, while it concentrates on supplying its own energy dormancy phases. Furthermore, delays are assumed to be time-varying heterogeneous. Firstly, a general input scheme that defends against network is constructed. Secondly, basis presented properties graph theory, equivalently transformed into products convergence infinite sub-stochastic matrices. Finally, an algebraic condition obtained formulate all asymptotically achieve behavior. Moreover, theoretical results verified by numerical example.
منابع مشابه
Denial of Service Attacks
Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...
متن کاملDenial of Service Attacks
................................................................................................................................................................4
متن کاملDenial-of-Service Attacks
Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-ofservice (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s Internet. The main aim of a DoS is the disruption of services by attempting to limit access to a mac...
متن کاملFormal Model of Time for Analyzing Denial-of-Service Attacks
A denial-of-service attack (DoS attack) is an attempt to make a system resource unavailable to its intended users. Several types of DoS attacks are known. A SYN flood attack is a typical DoS attack, exploiting the vulnerability of TCP’s three-way handshake with respect to imbalances between the computational costs of clients and server. In addition to cost imbalance, the amount of cost over a g...
متن کاملDenial of Service / Distributed Denial of Service MANAGING DoS ATTACKS
DISCLAIMER: To the extent permitted by law, this document is provided without any liability or warranty. Accordingly it is to be used only for the purposes specified and the reliability of any assessment or evaluation arising from it are matters for the independent judgment of users. This document is intended as a general guide only and users should seek professional advice as to their specific...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12133000