CN116506159A - A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack - Google Patents
A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack Download PDFInfo
- Publication number
- CN116506159A CN116506159A CN202310310913.2A CN202310310913A CN116506159A CN 116506159 A CN116506159 A CN 116506159A CN 202310310913 A CN202310310913 A CN 202310310913A CN 116506159 A CN116506159 A CN 116506159A
- Authority
- CN
- China
- Prior art keywords
- communication network
- control protocol
- dos attack
- intelligent communication
- network system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention considers the problems brought by DOS attack of the system in the communication network system and utilizes the T-S fuzzy positive multi-intelligent system to establish a state space model of the intelligent communication network system. A T-S fuzzy rule is used for approximating a linear system, and a Lyapunov function and matrix decomposition technology are utilized to provide a consistency control method based on a distributed PID controller, so that the intelligent communication network system can effectively avoid the problems of faults and the like no matter whether DOS attacks exist or not. The method fully considers the problems of positive and nonlinearity in an actual communication network system during modeling, and designs a fuzzy control protocol method of an intelligent communication network under DOS attack based on the problems.
Description
Technical Field
The invention belongs to the field of automation technology and modern control, and relates to modeling of a T-S fuzzy positive multi-agent system and a consistency problem of an intelligent communication network system based on a PID control protocol under DOS attack.
Background
The openness, interactivity and distribution characteristics of the internet enable people to realize the requirements of sharing, openness, flexibility and rapidness of information. The Internet creates an ideal space for information sharing, communication and service, and the rapid development and wide application of the Internet technology bring strong pushing force for the development of human beings. Daily communications over networks have become an integral part of people's life, work. However, as the frequency and number of data transmission in the network are increased, the hazard of the data communication safety problem is increased, and once the safety accident occurs in the communication network, not only is the communication between thousands of people blocked, but also unexpected loss of social value and economic value is brought. Therefore, the security of the communication network has a very important meaning. Only if the safety and the reliability are comprehensively ensured, the value of the communication network can be exerted to the maximum extent, and the economic and social development of China is promoted.
The communication network security problem now becomes an important problem in the field of automatic control, and the intelligent communication network system is a control technology, has remarkable effects on reducing network attack in the future, reducing the occurrence of security accidents, and improving the anti-interference capability of the communication network. Communication network security refers to the relevant measures deployed through hardware, software, operating systems, and other protective means to protect communication data from attack. The communication network security problem mainly refers to the communication network data security, and the network security problem generally refers to the situation that the communication network system is attacked by the outside (such as DOS attack), and the communication data is revealed, stolen, changed and deleted, or the continuity of the data communication is affected, so that transmission is interrupted, data packets are lost, and the like. The consistency of the multiple agents is that the states of the various agents in the multiple agent system are finally consistent through a proper control law, and the invention uses a controller with a proportional-integral-derivative control law as a PID controller. The PID controller (proportional-integral-derivative controller) is to set a proportional unit P, an integral unit I and a derivative unit D to carry out deviation adjustment on the whole control system, so that the actual value of the controlled variable is consistent with the preset value of the process requirement. The P part in the PID controller can reduce the steady-state error of the system, so that the control precision of the system is improved, the I part can improve the steady-state performance of the system, the D part can improve the dynamic performance of the system, and the PID controller is currently used in the research of multi-agent systems. In a communication network system, data packets transmitted by each communication sub-network are used as an intelligent agent to form a communication topology for information interaction. In the intelligent communication network system shown in fig. 1, for example, five communication subnets are taken as examples, the connection between the communication subnets represents that data packets are transmitted between the two communication subnets, so that the communication can be performed between the two communication subnets, and no connection represents that no communication information is interacted between the two communication subnets.
In the communication network system, the number of data packets transmitted by the communication sub-network is always nonnegative, and the communication network safety control mainly ensures that a relatively stable transmission structure is maintained between the communication sub-network and surrounding communication sub-networks by adjusting the structure of the communication sub-network, so that the rate of transmitting the data packets is changed as required, the anti-interference capability is improved, and the normal communication is ensured. Most of the existing communication network systems adopt wireless communication technology, and use mobile communication technologies such as LTE and 5G, and local area networks such as WiFi to realize communication. When external interference or malicious attack is encountered, the security of the communication network system is difficult to be ensured. Therefore, how to communicate normally by means of the intelligent network communication system even under the external DOS attack is important. The invention adopts a positive system to construct a communication network system, and uses the system modeling with non-negative characteristics, so that the model is more accurate. In an intelligent communication network system, DOS attack frequencies of different subnets in the same period are different, the subnets show different structural changes, the speeds of data packets transmitted are different, and obvious nonlinear characteristics are shown in modeling. In principle, a nonlinear positive system may be used to describe the nonlinear process of packet traffic variation. However, the nonlinear system is not easy to handle, and even if a control method of the nonlinear communication network system is designed, the nonlinear communication network system is difficult to realize. The nonlinear system is approximately modeled into a system with linear characteristics by means of the TS fuzzy model, so that the nonlinear system is more convenient to process, and the designed related control method is easier to realize. The intelligent communication network system is composed of a plurality of subnets and a large number of data packets, and the data packets transmitted by the subnets are regarded as multiple intelligent agents to build a positive multi-intelligent agent system model more properly. The PID controller can improve the steady state performance and dynamic performance of the system to control the subnet structure and the speed of transmitting data packets. Finally, based on the flow information of the transmission data packet, a fuzzy intelligent control protocol is constructed, so that all subnets can normally transmit the data packet, the consistency operation is kept, and the DOS attack resistance is improved.
Based on the analysis, the invention adopts a positive TS fuzzy multi-agent system to establish a mathematical model for the running process of the data packet of the communication network, and provides a consistency method based on a distributed PID controller. The consistency control method can improve the steady-state performance and the dynamic performance of the intelligent communication system, and ensure that the system state achieves consistency and the communication is successfully completed.
Disclosure of Invention
The invention establishes a positive TS fuzzy multi-intelligent system model aiming at the data packet operation process of an intelligent communication network system, and provides a consistency method based on a distributed PID controller. The specific technical scheme is as follows:
a fuzzy control protocol method of intelligent communication network under DOS attack includes the following steps:
step 1, establishing a state space model of the number of data packets in the data transmission process of an intelligent communication network;
step 2, establishing a distributed PID control protocol of the intelligent communication network system;
step 3, designing the proportion of the distributed PID control protocol;
step 4, designing DOS attack times N (k) 0 ,k);
Step 5, respectively designing a distributed PID control protocol and a PID gain matrix of the communication network system according to the DOS attack situation and the DOS attack situation;
step 6, constructing a condition of stable operation of the intelligent communication network system;
step 7, constructing a positive verification process of the intelligent communication network system;
and 8, constructing a consistency verification process of the intelligent communication network system.
Further, the specific method of the step 1 is as follows: analyzing a communication network data transmission dynamic process and collecting model data, and establishing a system state space model in the following form:
wherein x is i (k)∈R n The data packets are data packets transmitted by the intelligent communication network, and n represents the number of sub-networks in the intelligent communication network; y is i (k)∈R q The number of the data packets which are measured and accepted by the data terminal is represented, and q represents the number of the measuring output sensors;
the control input of the k moment to the next running state of the ith subnet is shown, and p represents the number of measuring input sensors; h is a r (θ (k)) represents the use of the network in the communication system, A.epsilon.R n×n ,B∈R n×p ,C∈R q×n Is a system matrix, R n ,R q ,R p ,R n×n ,R n×p ,R q×n The n-dimensional vector, the q-dimensional vector, the p-dimensional vector, the n×n-dimensional, the n×p-dimensional, and the q×n-dimensional matrix are expressed, respectively.
Further, the construction form of the distributed PID control protocol in step 2 is as follows:
wherein,,and->All are additions of PID control protocol to be designedA benefit matrix;Is a matrix related to the communication topology between the agents, if the ith agent and the jth agent can communicateOtherwise, go (L)>The dimension of which is related to the number of agents in the multi-agent system.
Further, in step 3 e i (k) And Deltay i (k) Integrating and differentiating parts of the distributed PID control protocol, respectively, wherein the integrating part e i (k)=y i (k-1)+(1-α)e i (k-1), differential portion Deltay i (k)=y i (k)-y i (k-1), alpha being a tuning parameter and alpha > 0.
Further, step 4, N (k 0 K) satisfies the following condition:
further, step 5 includes the steps of:
step 5.1 when there is no DOS attack in the communication network system, i.e. k.epsilon.Θ (k 0 ,k):
PID gain matrix:
distributed PID control protocol:
step 5.2 when there is a DOS attack in the communication network system, i.e. k εΓ (k) 0 ,k):
PID gain matrix:
distributed PID control protocol:
further, the construction method of the condition of smooth operation of the intelligent communication network system in the step 6 is as follows:
the design constant lambda is more than 1,0 < alpha is less than or equal to 1,μ 2 >1,vector sum->(Vector)
So that
Wherein 1- [ D] ii =∑ i≠j [D] ij Then, under the distributed PID control protocol in step 2, the intelligent communication network system realizes positive and consistency, and the gain matrix is
Wherein 1 is p A p-dimensional column vector representing all elements as 1,the p-dimensional column vector representing the 1 st element and the 0 remaining elements, and the DOS attack duration satisfies:
further, the positive verification process of the intelligent communication network system in step 7 is constructed as follows:
step 7.1, according to the state space model of the intelligent communication network established in step 1, the PID control protocol established in step 2, the integral part of the PID control protocol established in step 3, and according to the existence of DOS attack in step 5, the two conditions can be obtained
K.epsilon.Θ (k) when there is no DOS attack 0 ,k),
When there is DOS attack, k εΓ (k) 0 ,k),
Wherein I is M And I q The identity matrices in M x M and q x q dimensions respectively,is a Cronecker product operator, and
step 7.2 definitionCombining step 6 and step 7.1 can result in the absence of DOS attacks
Wherein,,
when there is DOS attack
Wherein,,
let matrixAnd->The diagonal matrix and the off-diagonal matrix of (a) are:
step 7.3, designing gain matrix and according to the first five conditions in step 6And
the method comprises the following steps:
thus (2)The intelligent communication network system in both cases is positive.
Further, in step 8, the consistency verification process of the intelligent communication network system is as follows:
step 8.1 selecting a linear residual positive Lyapunov function according to the presence or absence of DOS attack
When k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ),
Wherein,,
step 8.2 StructureWhen k is E [ k ] 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
step 8.3 combining step 8.1 and step 8.2 to obtain the current k ε [ k ] 2f-2 ,k 2f-1 ),
Wherein the method comprises the steps of
When k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
wherein the method comprises the steps of
Step 8.4 can be obtained from the conditions in step 6 when k.epsilon.k 2f-2 ,k 2f-1 ),
The method further comprises the following steps:
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
the method further comprises the following steps:
8.5 based on the conclusions of step 8.1 and step 8.4, the conditions are met in both cases
Therefore, the intelligent communication network system is consistent, that is, normal operation between each subnet and surrounding subnets in the intelligent communication network system is realized whether DOS attack exists or not.
The beneficial effects of the invention are as follows:
the method of the invention firstly utilizes a T-S fuzzy positive multi-intelligent system to establish a state space model of a communication network system. And information interaction among the transmission data packets of different subnets is realized by means of the communication topological graph and graph theory knowledge. A distributed PID control protocol is designed by means of the constructed linear residual Lyapunov function and matrix decomposition technology, and the positive and consistency of the distributed PID control protocol are analyzed, so that a relatively stable motion state is kept between data packets transmitted by each sub-network in a communication network system.
Drawings
FIG. 1 is a process diagram of a communication network system to which the present invention applies;
fig. 2 is a schematic diagram of an intelligent communication network-based system according to the present invention.
Detailed Description
The invention aims at solving the problem of data packet consistency control of sub-network transmission in an intelligent communication network system, researches the communication network system by using a distributed PID control protocol, and provides a distributed PID control protocol method of the intelligent communication network system based on T-S fuzzy positive multi-agent system modeling.
As shown in fig. 2, the fuzzy control protocol method of the intelligent communication network under DoS attack of the present invention includes the following steps:
step 1, establishing a state space model of the number of data packets in the data transmission process of an intelligent communication network, wherein the specific method comprises the following steps: analyzing a communication network data transmission dynamic process and collecting model data, and establishing a system state space model in the following form:
wherein x is i (k)∈R n The data packets are data packets transmitted by the intelligent communication network, and n represents the number of sub-networks in the intelligent communication network; y is i (k)∈R q The number of the data packets which are measured and accepted by the data terminal is represented, and q represents the number of the measuring output sensors;the control input of the k moment to the next running state of the ith subnet is shown, and p represents the number of measuring input sensors; h is a r (θ (k)) represents the use of the network in the communication system, A.epsilon.R n×n ,B∈R n×p ,C∈R q×n Is a system matrix, R n ,R q ,R p ,R n×n ,R n×p ,R q×n The n-dimensional vector, the q-dimensional vector, the p-dimensional vector, the n×n-dimensional, the n×p-dimensional, and the q×n-dimensional matrix are expressed, respectively.
Step 2, establishing a distributed PID control protocol of the intelligent communication network system, wherein the construction form is as follows:
wherein,,and->All are gain matrices of the PID control protocol to be designed;Is a matrix related to the communication topology between the agents, if the ith agent and the jth agent can communicateOtherwise, go (L)>The dimension of which is related to the number of agents in the multi-agent system.
Step 3, designing a proportional, integral and derivative part, e of the distributed PID control protocol i (k) And Deltay i (k) Integrating and differentiating parts of the distributed PID control protocol, respectively, wherein the integrating part e i (k)=y i (k-1)+(1-α)e i (k-1), differential portion Deltay i (k)=y i (k)-y i (k-1), alpha is a small tuning parameter and alpha > 0.
Step 4, designing DOS attack times N (k) 0 K), satisfying the following conditions:
and 5, respectively designing a distributed PID control protocol and a PID gain matrix of the communication network system according to the existence of DOS attack and DOS attack in two cases according to the actual situation.
Step 5.1 when there is no DOS attack in the communication network system, i.e. k.epsilon.Θ (k 0 ,k):
PID gain matrix:
distributed PID control protocol:
step 5.2 when there is a DOS attack in the communication network system, i.e. k εΓ (k) 0 ,k):
PID gain matrix:
distributed PID control protocol:
and 6, the intelligent communication network system is under a stable operation condition, and the construction method comprises the following steps:
the design constant lambda is more than 1,0 < alpha is less than or equal to 1,μ 2 >1,vector sum->(Vector)
So that
Wherein the method comprises the steps ofThen, under the distributed PID control protocol in step 2, the intelligent communication network system realizes positive and consistency, and the gain matrix is
Wherein 1 is p A p-dimensional column vector representing all elements as 1,the p-dimensional column vector representing the 1 st element and the 0 remaining elements, and the DOS attack duration satisfies:
step 7, a positive verification process of the intelligent communication network system is constructed as follows:
step 7.1, according to the state space model of the intelligent communication network established in step 1, the PID control protocol established in step 2, the integral part of the PID control protocol established in step 3, and according to the existence of DOS attack in step 5, the two conditions can be obtained
K.epsilon.Θ (k) when there is no DOS attack 0 ,k),
When there is DOS attack, k εΓ (k) 0 ,k),
Wherein I is M And I q Respectively are provided withIs an identity matrix of dimensions M x M and q x q,is a Cronecker product operator, and +.>
Step 7.2 definitionCombining steps 6 and 7.1 can result in the absence of DOS attacks
Wherein,,
when there is DOS attack
Wherein,,
let matrixAnd->The diagonal matrix and the off-diagonal matrix of (a) are:
step 7.3, designing gain matrix and according to the first five conditions in step 6And
the method can obtain the following steps:
thus (2)Thus, the intelligent communication network system in both cases is positive.
Step 8, the consistency verification process of the intelligent communication network system is as follows:
step 8.1 selecting a linear residual positive Lyapunov function according to the presence or absence of DOS attack
When k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ),
Wherein,,
step 8.2 StructureIs used for the differential of (a),
when k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
step 8.3 combines steps 8.1 and 8.2 to obtain the product when k E [ k ] 2f-2 ,k 2f-1 ),
Wherein the method comprises the steps of
When k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
wherein the method comprises the steps of
Step 8.4 can be obtained from the conditions in step 6 when k.epsilon.k 2f-2 ,k 2f-1 ),
The method further comprises the following steps:
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
the method further comprises the following steps:
step 8.5 based on the conclusions of steps 8.1 and 8.4, the condition DeltaV (X (k)) < 0 is satisfied in both cases
Therefore, the intelligent communication network system is consistent, that is, normal operation between each subnet and surrounding subnets in the intelligent communication network system is realized whether DOS attack exists or not.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310310913.2A CN116506159B (en) | 2023-03-28 | 2023-03-28 | A fuzzy control protocol method for intelligent communication networks under DOS attacks |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310310913.2A CN116506159B (en) | 2023-03-28 | 2023-03-28 | A fuzzy control protocol method for intelligent communication networks under DOS attacks |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN116506159A true CN116506159A (en) | 2023-07-28 |
| CN116506159B CN116506159B (en) | 2025-09-30 |
Family
ID=87329361
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310310913.2A Active CN116506159B (en) | 2023-03-28 | 2023-03-28 | A fuzzy control protocol method for intelligent communication networks under DOS attacks |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116506159B (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119155709A (en) * | 2024-11-20 | 2024-12-17 | 北京数易科技有限公司 | Unmanned aerial vehicle cluster directional access protocol optimization method, system and medium |
| CN119179290A (en) * | 2024-11-11 | 2024-12-24 | 北京理工大学 | Multi-agent elastic control method based on virtual network three-dimensional expansion under DoS attack |
| CN119853944A (en) * | 2024-11-25 | 2025-04-18 | 天翼云科技有限公司 | PID-based network attack method and device |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160170384A1 (en) * | 2014-12-11 | 2016-06-16 | University Of New Brunswick | Model predictive controller and method with correction parameter to compensate for time lag |
| CN109033585A (en) * | 2018-07-13 | 2018-12-18 | 河海大学 | The PID controller design method of uncertain network control system based on T-S fuzzy model |
| CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
-
2023
- 2023-03-28 CN CN202310310913.2A patent/CN116506159B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160170384A1 (en) * | 2014-12-11 | 2016-06-16 | University Of New Brunswick | Model predictive controller and method with correction parameter to compensate for time lag |
| CN109033585A (en) * | 2018-07-13 | 2018-12-18 | 河海大学 | The PID controller design method of uncertain network control system based on T-S fuzzy model |
| CN112865752A (en) * | 2020-12-24 | 2021-05-28 | 南京财经大学 | Filter design method based on adaptive event trigger mechanism under hybrid network attack |
Non-Patent Citations (1)
| Title |
|---|
| 赖绍禹;陈博;俞立;: "DoS攻击下基于切换Luenberger观测器的冗余控制", 控制理论与应用, no. 04, 30 April 2020 (2020-04-30) * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119179290A (en) * | 2024-11-11 | 2024-12-24 | 北京理工大学 | Multi-agent elastic control method based on virtual network three-dimensional expansion under DoS attack |
| CN119155709A (en) * | 2024-11-20 | 2024-12-17 | 北京数易科技有限公司 | Unmanned aerial vehicle cluster directional access protocol optimization method, system and medium |
| CN119853944A (en) * | 2024-11-25 | 2025-04-18 | 天翼云科技有限公司 | PID-based network attack method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116506159B (en) | 2025-09-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN116506159A (en) | A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack | |
| US8893253B2 (en) | Firewall apparatus, systems, and methods employing detection of application anomalies | |
| CN112865752B (en) | Filter design method based on self-adaptive event triggering mechanism under hybrid network attack | |
| DE60216218T2 (en) | Personal firewall with space-dependent functionality | |
| Ma | Analysis of anomaly detection method for Internet of things based on deep learning | |
| DE102016103521A1 (en) | Detection of anomalies in industrial communication networks | |
| Alcaraz et al. | Policy enforcement system for secure interoperable control in distributed smart grid systems | |
| EP2564574B1 (en) | Method for filtering and processing of data in a packet switching network | |
| Zhang et al. | Event-based resilient formation control of multiagent systems | |
| He et al. | OpenFlow‐based low‐overhead and high‐accuracy SDN measurement framework | |
| Kim et al. | Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure | |
| CN117201177A (en) | Illegal network communication active monitoring strategy design method based on game framework | |
| CN115529193A (en) | Secure communication method of cloud edge collaborative tunnel | |
| DE112022002401T5 (en) | USE OF OUT-BAND COMMUNICATION CHANNELS BETWEEN PROCESS AUTOMATION NODES | |
| CN119584136A (en) | A multi-terminal communication system based on the Internet of Things | |
| Gergeleit et al. | Modeling security requirements and controls for an automated deployment of industrial IT systems | |
| CN119629172A (en) | A switch control method and system for Internet of Things based on edge computing | |
| Guo et al. | Event‐triggered distributed consensus control of nonlinear multi‐agent systems with unknown Bouc–Wen hysteresis input and DoS attacks | |
| Barrera et al. | Statistical detection of congestion in routers | |
| CN113805482B (en) | A design method for event-triggered DOFF quantized controller under deception attack | |
| Marks et al. | Optimizing the scalability of network intrusion detection systems using mobile agents | |
| Pan et al. | Secure event-triggered vehicle platooning control with proportional integral observers under denial of service attacks | |
| SelvaKumar et al. | Network Traffic Control Using AI | |
| WO2025113957A1 (en) | Access permission decision based on a capacity value of the associated data transmission connection | |
| CN111030872A (en) | Reliable control method for stable operation of communication network data transmission |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |