[go: up one dir, main page]

CN116506159A - A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack - Google Patents

A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack Download PDF

Info

Publication number
CN116506159A
CN116506159A CN202310310913.2A CN202310310913A CN116506159A CN 116506159 A CN116506159 A CN 116506159A CN 202310310913 A CN202310310913 A CN 202310310913A CN 116506159 A CN116506159 A CN 116506159A
Authority
CN
China
Prior art keywords
communication network
control protocol
dos attack
intelligent communication
network system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310310913.2A
Other languages
Chinese (zh)
Other versions
CN116506159B (en
Inventor
黄梦醒
付仁杰
张俊锋
毋媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan University
Original Assignee
Hainan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan University filed Critical Hainan University
Priority to CN202310310913.2A priority Critical patent/CN116506159B/en
Publication of CN116506159A publication Critical patent/CN116506159A/en
Application granted granted Critical
Publication of CN116506159B publication Critical patent/CN116506159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention considers the problems brought by DOS attack of the system in the communication network system and utilizes the T-S fuzzy positive multi-intelligent system to establish a state space model of the intelligent communication network system. A T-S fuzzy rule is used for approximating a linear system, and a Lyapunov function and matrix decomposition technology are utilized to provide a consistency control method based on a distributed PID controller, so that the intelligent communication network system can effectively avoid the problems of faults and the like no matter whether DOS attacks exist or not. The method fully considers the problems of positive and nonlinearity in an actual communication network system during modeling, and designs a fuzzy control protocol method of an intelligent communication network under DOS attack based on the problems.

Description

Fuzzy control protocol method of intelligent communication network under DOS attack
Technical Field
The invention belongs to the field of automation technology and modern control, and relates to modeling of a T-S fuzzy positive multi-agent system and a consistency problem of an intelligent communication network system based on a PID control protocol under DOS attack.
Background
The openness, interactivity and distribution characteristics of the internet enable people to realize the requirements of sharing, openness, flexibility and rapidness of information. The Internet creates an ideal space for information sharing, communication and service, and the rapid development and wide application of the Internet technology bring strong pushing force for the development of human beings. Daily communications over networks have become an integral part of people's life, work. However, as the frequency and number of data transmission in the network are increased, the hazard of the data communication safety problem is increased, and once the safety accident occurs in the communication network, not only is the communication between thousands of people blocked, but also unexpected loss of social value and economic value is brought. Therefore, the security of the communication network has a very important meaning. Only if the safety and the reliability are comprehensively ensured, the value of the communication network can be exerted to the maximum extent, and the economic and social development of China is promoted.
The communication network security problem now becomes an important problem in the field of automatic control, and the intelligent communication network system is a control technology, has remarkable effects on reducing network attack in the future, reducing the occurrence of security accidents, and improving the anti-interference capability of the communication network. Communication network security refers to the relevant measures deployed through hardware, software, operating systems, and other protective means to protect communication data from attack. The communication network security problem mainly refers to the communication network data security, and the network security problem generally refers to the situation that the communication network system is attacked by the outside (such as DOS attack), and the communication data is revealed, stolen, changed and deleted, or the continuity of the data communication is affected, so that transmission is interrupted, data packets are lost, and the like. The consistency of the multiple agents is that the states of the various agents in the multiple agent system are finally consistent through a proper control law, and the invention uses a controller with a proportional-integral-derivative control law as a PID controller. The PID controller (proportional-integral-derivative controller) is to set a proportional unit P, an integral unit I and a derivative unit D to carry out deviation adjustment on the whole control system, so that the actual value of the controlled variable is consistent with the preset value of the process requirement. The P part in the PID controller can reduce the steady-state error of the system, so that the control precision of the system is improved, the I part can improve the steady-state performance of the system, the D part can improve the dynamic performance of the system, and the PID controller is currently used in the research of multi-agent systems. In a communication network system, data packets transmitted by each communication sub-network are used as an intelligent agent to form a communication topology for information interaction. In the intelligent communication network system shown in fig. 1, for example, five communication subnets are taken as examples, the connection between the communication subnets represents that data packets are transmitted between the two communication subnets, so that the communication can be performed between the two communication subnets, and no connection represents that no communication information is interacted between the two communication subnets.
In the communication network system, the number of data packets transmitted by the communication sub-network is always nonnegative, and the communication network safety control mainly ensures that a relatively stable transmission structure is maintained between the communication sub-network and surrounding communication sub-networks by adjusting the structure of the communication sub-network, so that the rate of transmitting the data packets is changed as required, the anti-interference capability is improved, and the normal communication is ensured. Most of the existing communication network systems adopt wireless communication technology, and use mobile communication technologies such as LTE and 5G, and local area networks such as WiFi to realize communication. When external interference or malicious attack is encountered, the security of the communication network system is difficult to be ensured. Therefore, how to communicate normally by means of the intelligent network communication system even under the external DOS attack is important. The invention adopts a positive system to construct a communication network system, and uses the system modeling with non-negative characteristics, so that the model is more accurate. In an intelligent communication network system, DOS attack frequencies of different subnets in the same period are different, the subnets show different structural changes, the speeds of data packets transmitted are different, and obvious nonlinear characteristics are shown in modeling. In principle, a nonlinear positive system may be used to describe the nonlinear process of packet traffic variation. However, the nonlinear system is not easy to handle, and even if a control method of the nonlinear communication network system is designed, the nonlinear communication network system is difficult to realize. The nonlinear system is approximately modeled into a system with linear characteristics by means of the TS fuzzy model, so that the nonlinear system is more convenient to process, and the designed related control method is easier to realize. The intelligent communication network system is composed of a plurality of subnets and a large number of data packets, and the data packets transmitted by the subnets are regarded as multiple intelligent agents to build a positive multi-intelligent agent system model more properly. The PID controller can improve the steady state performance and dynamic performance of the system to control the subnet structure and the speed of transmitting data packets. Finally, based on the flow information of the transmission data packet, a fuzzy intelligent control protocol is constructed, so that all subnets can normally transmit the data packet, the consistency operation is kept, and the DOS attack resistance is improved.
Based on the analysis, the invention adopts a positive TS fuzzy multi-agent system to establish a mathematical model for the running process of the data packet of the communication network, and provides a consistency method based on a distributed PID controller. The consistency control method can improve the steady-state performance and the dynamic performance of the intelligent communication system, and ensure that the system state achieves consistency and the communication is successfully completed.
Disclosure of Invention
The invention establishes a positive TS fuzzy multi-intelligent system model aiming at the data packet operation process of an intelligent communication network system, and provides a consistency method based on a distributed PID controller. The specific technical scheme is as follows:
a fuzzy control protocol method of intelligent communication network under DOS attack includes the following steps:
step 1, establishing a state space model of the number of data packets in the data transmission process of an intelligent communication network;
step 2, establishing a distributed PID control protocol of the intelligent communication network system;
step 3, designing the proportion of the distributed PID control protocol;
step 4, designing DOS attack times N (k) 0 ,k);
Step 5, respectively designing a distributed PID control protocol and a PID gain matrix of the communication network system according to the DOS attack situation and the DOS attack situation;
step 6, constructing a condition of stable operation of the intelligent communication network system;
step 7, constructing a positive verification process of the intelligent communication network system;
and 8, constructing a consistency verification process of the intelligent communication network system.
Further, the specific method of the step 1 is as follows: analyzing a communication network data transmission dynamic process and collecting model data, and establishing a system state space model in the following form:
wherein x is i (k)∈R n The data packets are data packets transmitted by the intelligent communication network, and n represents the number of sub-networks in the intelligent communication network; y is i (k)∈R q The number of the data packets which are measured and accepted by the data terminal is represented, and q represents the number of the measuring output sensors;
the control input of the k moment to the next running state of the ith subnet is shown, and p represents the number of measuring input sensors; h is a r (θ (k)) represents the use of the network in the communication system, A.epsilon.R n×n ,B∈R n×p ,C∈R q×n Is a system matrix, R n ,R q ,R p ,R n×n ,R n×p ,R q×n The n-dimensional vector, the q-dimensional vector, the p-dimensional vector, the n×n-dimensional, the n×p-dimensional, and the q×n-dimensional matrix are expressed, respectively.
Further, the construction form of the distributed PID control protocol in step 2 is as follows:
wherein,,and->All are additions of PID control protocol to be designedA benefit matrix;Is a matrix related to the communication topology between the agents, if the ith agent and the jth agent can communicateOtherwise, go (L)>The dimension of which is related to the number of agents in the multi-agent system.
Further, in step 3 e i (k) And Deltay i (k) Integrating and differentiating parts of the distributed PID control protocol, respectively, wherein the integrating part e i (k)=y i (k-1)+(1-α)e i (k-1), differential portion Deltay i (k)=y i (k)-y i (k-1), alpha being a tuning parameter and alpha > 0.
Further, step 4, N (k 0 K) satisfies the following condition:
further, step 5 includes the steps of:
step 5.1 when there is no DOS attack in the communication network system, i.e. k.epsilon.Θ (k 0 ,k):
PID gain matrix:
distributed PID control protocol:
step 5.2 when there is a DOS attack in the communication network system, i.e. k εΓ (k) 0 ,k):
PID gain matrix:
distributed PID control protocol:
further, the construction method of the condition of smooth operation of the intelligent communication network system in the step 6 is as follows:
the design constant lambda is more than 1,0 < alpha is less than or equal to 1,μ 2 >1,vector sum->(Vector)
So that
Wherein 1- [ D] ii =∑ i≠j [D] ij Then, under the distributed PID control protocol in step 2, the intelligent communication network system realizes positive and consistency, and the gain matrix is
Wherein 1 is p A p-dimensional column vector representing all elements as 1,the p-dimensional column vector representing the 1 st element and the 0 remaining elements, and the DOS attack duration satisfies:
further, the positive verification process of the intelligent communication network system in step 7 is constructed as follows:
step 7.1, according to the state space model of the intelligent communication network established in step 1, the PID control protocol established in step 2, the integral part of the PID control protocol established in step 3, and according to the existence of DOS attack in step 5, the two conditions can be obtained
K.epsilon.Θ (k) when there is no DOS attack 0 ,k),
When there is DOS attack, k εΓ (k) 0 ,k),
Wherein I is M And I q The identity matrices in M x M and q x q dimensions respectively,is a Cronecker product operator, and
step 7.2 definitionCombining step 6 and step 7.1 can result in the absence of DOS attacks
Wherein,,
when there is DOS attack
Wherein,,
let matrixAnd->The diagonal matrix and the off-diagonal matrix of (a) are:
step 7.3, designing gain matrix and according to the first five conditions in step 6And
the method comprises the following steps:
thus (2)The intelligent communication network system in both cases is positive.
Further, in step 8, the consistency verification process of the intelligent communication network system is as follows:
step 8.1 selecting a linear residual positive Lyapunov function according to the presence or absence of DOS attack
When k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ),
Wherein,,
step 8.2 StructureWhen k is E [ k ] 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
step 8.3 combining step 8.1 and step 8.2 to obtain the current k ε [ k ] 2f-2 ,k 2f-1 ),
Wherein the method comprises the steps of
When k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
wherein the method comprises the steps of
Step 8.4 can be obtained from the conditions in step 6 when k.epsilon.k 2f-2 ,k 2f-1 ),
The method further comprises the following steps:
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
the method further comprises the following steps:
8.5 based on the conclusions of step 8.1 and step 8.4, the conditions are met in both cases
Therefore, the intelligent communication network system is consistent, that is, normal operation between each subnet and surrounding subnets in the intelligent communication network system is realized whether DOS attack exists or not.
The beneficial effects of the invention are as follows:
the method of the invention firstly utilizes a T-S fuzzy positive multi-intelligent system to establish a state space model of a communication network system. And information interaction among the transmission data packets of different subnets is realized by means of the communication topological graph and graph theory knowledge. A distributed PID control protocol is designed by means of the constructed linear residual Lyapunov function and matrix decomposition technology, and the positive and consistency of the distributed PID control protocol are analyzed, so that a relatively stable motion state is kept between data packets transmitted by each sub-network in a communication network system.
Drawings
FIG. 1 is a process diagram of a communication network system to which the present invention applies;
fig. 2 is a schematic diagram of an intelligent communication network-based system according to the present invention.
Detailed Description
The invention aims at solving the problem of data packet consistency control of sub-network transmission in an intelligent communication network system, researches the communication network system by using a distributed PID control protocol, and provides a distributed PID control protocol method of the intelligent communication network system based on T-S fuzzy positive multi-agent system modeling.
As shown in fig. 2, the fuzzy control protocol method of the intelligent communication network under DoS attack of the present invention includes the following steps:
step 1, establishing a state space model of the number of data packets in the data transmission process of an intelligent communication network, wherein the specific method comprises the following steps: analyzing a communication network data transmission dynamic process and collecting model data, and establishing a system state space model in the following form:
wherein x is i (k)∈R n The data packets are data packets transmitted by the intelligent communication network, and n represents the number of sub-networks in the intelligent communication network; y is i (k)∈R q The number of the data packets which are measured and accepted by the data terminal is represented, and q represents the number of the measuring output sensors;the control input of the k moment to the next running state of the ith subnet is shown, and p represents the number of measuring input sensors; h is a r (θ (k)) represents the use of the network in the communication system, A.epsilon.R n×n ,B∈R n×p ,C∈R q×n Is a system matrix, R n ,R q ,R p ,R n×n ,R n×p ,R q×n The n-dimensional vector, the q-dimensional vector, the p-dimensional vector, the n×n-dimensional, the n×p-dimensional, and the q×n-dimensional matrix are expressed, respectively.
Step 2, establishing a distributed PID control protocol of the intelligent communication network system, wherein the construction form is as follows:
wherein,,and->All are gain matrices of the PID control protocol to be designed;Is a matrix related to the communication topology between the agents, if the ith agent and the jth agent can communicateOtherwise, go (L)>The dimension of which is related to the number of agents in the multi-agent system.
Step 3, designing a proportional, integral and derivative part, e of the distributed PID control protocol i (k) And Deltay i (k) Integrating and differentiating parts of the distributed PID control protocol, respectively, wherein the integrating part e i (k)=y i (k-1)+(1-α)e i (k-1), differential portion Deltay i (k)=y i (k)-y i (k-1), alpha is a small tuning parameter and alpha > 0.
Step 4, designing DOS attack times N (k) 0 K), satisfying the following conditions:
and 5, respectively designing a distributed PID control protocol and a PID gain matrix of the communication network system according to the existence of DOS attack and DOS attack in two cases according to the actual situation.
Step 5.1 when there is no DOS attack in the communication network system, i.e. k.epsilon.Θ (k 0 ,k):
PID gain matrix:
distributed PID control protocol:
step 5.2 when there is a DOS attack in the communication network system, i.e. k εΓ (k) 0 ,k):
PID gain matrix:
distributed PID control protocol:
and 6, the intelligent communication network system is under a stable operation condition, and the construction method comprises the following steps:
the design constant lambda is more than 1,0 < alpha is less than or equal to 1,μ 2 >1,vector sum->(Vector)
So that
Wherein the method comprises the steps ofThen, under the distributed PID control protocol in step 2, the intelligent communication network system realizes positive and consistency, and the gain matrix is
Wherein 1 is p A p-dimensional column vector representing all elements as 1,the p-dimensional column vector representing the 1 st element and the 0 remaining elements, and the DOS attack duration satisfies:
step 7, a positive verification process of the intelligent communication network system is constructed as follows:
step 7.1, according to the state space model of the intelligent communication network established in step 1, the PID control protocol established in step 2, the integral part of the PID control protocol established in step 3, and according to the existence of DOS attack in step 5, the two conditions can be obtained
K.epsilon.Θ (k) when there is no DOS attack 0 ,k),
When there is DOS attack, k εΓ (k) 0 ,k),
Wherein I is M And I q Respectively are provided withIs an identity matrix of dimensions M x M and q x q,is a Cronecker product operator, and +.>
Step 7.2 definitionCombining steps 6 and 7.1 can result in the absence of DOS attacks
Wherein,,
when there is DOS attack
Wherein,,
let matrixAnd->The diagonal matrix and the off-diagonal matrix of (a) are:
step 7.3, designing gain matrix and according to the first five conditions in step 6And
the method can obtain the following steps:
thus (2)Thus, the intelligent communication network system in both cases is positive.
Step 8, the consistency verification process of the intelligent communication network system is as follows:
step 8.1 selecting a linear residual positive Lyapunov function according to the presence or absence of DOS attack
When k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ),
Wherein,,
step 8.2 StructureIs used for the differential of (a),
when k is E [ k 2f-2 ,k 2f-1 ) In the time-course of which the first and second contact surfaces,
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
step 8.3 combines steps 8.1 and 8.2 to obtain the product when k E [ k ] 2f-2 ,k 2f-1 ),
Wherein the method comprises the steps of
When k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
wherein the method comprises the steps of
Step 8.4 can be obtained from the conditions in step 6 when k.epsilon.k 2f-2 ,k 2f-1 ),
The method further comprises the following steps:
when k is E [ k 2f-1 ,k 2f ) In the time-course of which the first and second contact surfaces,
the method further comprises the following steps:
step 8.5 based on the conclusions of steps 8.1 and 8.4, the condition DeltaV (X (k)) < 0 is satisfied in both cases
Therefore, the intelligent communication network system is consistent, that is, normal operation between each subnet and surrounding subnets in the intelligent communication network system is realized whether DOS attack exists or not.

Claims (9)

1.一种DOS攻击下智能通信网络的模糊控制协议方法,其特征在于如下步骤:1. A fuzzy control protocol method for an intelligent communication network under a DOS attack, characterized by the following steps: 步骤1、建立智能通信网络数据传输过程数据包数量的状态空间模型;Step 1: Establish a state space model of the number of data packets in the intelligent communication network data transmission process; 步骤2、建立智能通信网络系统的分布式PID控制协议;Step 2: Establish a distributed PID control protocol for the intelligent communication network system; 步骤3、设计分布式PID控制协议的比例;Step 3, design the proportion of the distributed PID control protocol; 步骤4、设计DOS攻击次数N(k0,k);Step 4: Design the number of DOS attacks N(k 0 ,k); 步骤5、根据有DOS攻击和没有DOS攻击两种情形,分别设计通信网络系统的分布式PID控制协议和PID增益矩阵;Step 5: According to the two situations of DOS attack and no DOS attack, the distributed PID control protocol and PID gain matrix of the communication network system are designed respectively; 步骤6、构建智能通信网络系统平稳运行的条件;Step 6: Establish the conditions for the smooth operation of the intelligent communication network system; 步骤7、构建智能通信网络系统的正性验证过程;Step 7: Construct a positive verification process of the intelligent communication network system; 步骤8、构建智能通信网络系统的一致性验证过程。Step 8: Construct the consistency verification process of the intelligent communication network system. 2.根据权利要求1所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:2. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 1 is characterized in that: 步骤1具体方法是:分析通信网络数据传输动态过程并采集模型数据,建立系统状态空间模型,形式如下:Step 1 The specific method is: analyze the dynamic process of communication network data transmission and collect model data to establish the system state space model in the following form: 其中,xi(k)∈Rn为智能通信网络数据传输的数据包,n代表智能通信网络中子网络的数量;yi(k)∈Rq表示数据终端测量到接受的数据包个数,q表示测量输出传感器个数;表示k时刻对第i个子网接下来运行状态的控制输入,p表示测量输入传感器个数;hr(θ(k))表示通信系统中网络的使用情况,A∈Rn×n,B∈Rn×p,C∈Rq×n是系统矩阵,Rn,Rq,Rp,Rn×n,Rn×p,Rq×n,分别表示n维向量、q维向量、p维向量、n×n维、n×p维、q×n维矩阵。Wherein, x i (k)∈R n is the data packet transmitted by the intelligent communication network, n represents the number of sub-networks in the intelligent communication network; y i (k)∈R q represents the number of data packets received by the data terminal, and q represents the number of measurement output sensors; represents the control input for the next operating state of the ith subnet at time k, p represents the number of measurement input sensors; hr (θ(k)) represents the usage of the network in the communication system, A∈Rn ×n , B∈Rn ×p , C∈Rq ×n are the system matrices, Rn , Rq , Rp , Rn ×n , Rn× p , Rq×n represent n-dimensional vector, q-dimensional vector, p-dimensional vector, n×n-dimensional, n×p-dimensional, and q×n-dimensional matrices, respectively. 3.根据权利要求2所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:3. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 2 is characterized in that: 步骤2中分布式PID控制协议的构建形式如下:The distributed PID control protocol in step 2 is constructed as follows: 其中,均是要设计的PID控制协议的增益矩阵;是一个与智能体间的通信拓扑相关的矩阵,若第i个智能体与第j个智能体可以通信,则否则,其维数与多智能体系统中智能体的个数相关。in, and These are the gain matrices of the PID control protocol to be designed; is a matrix related to the communication topology between agents. If the i-th agent can communicate with the j-th agent, then otherwise, Its dimension is related to the number of agents in the multi-agent system. 4.根据权利要求3所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:4. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 3 is characterized in that: 步骤3中ei(k)和Δyi(k)分别是分布式PID控制协议的积分和微分部分,其中积分部分ei(k)=yi(k-1)+(1-α)ei(k-1),微分部分Δyi(k)=yi(k)-yi(k-1),α是调优参数且α>0。In step 3, e i (k) and Δy i (k) are the integral and differential parts of the distributed PID control protocol, respectively, where the integral part e i (k) = y i (k-1) + (1-α)e i (k-1), the differential part Δy i (k) = y i (k) - y i (k-1), α is a tuning parameter and α>0. 5.根据权利要求4所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:5. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 4 is characterized in that: 步骤4、N(k0,k)满足以下条件:Step 4: N(k 0 ,k) satisfies the following conditions: 6.根据权利要求5所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:6. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 5 is characterized in that: 步骤5包括如下步骤:Step 5 includes the following steps: 步骤5.1当通信网络系统中没有DOS攻击时,即k∈Θ(k0,k):Step 5.1 When there is no DOS attack in the communication network system, that is, k∈Θ(k 0 ,k): PID增益矩阵:PID gain matrix: 分布式PID控制协议:Distributed PID control protocol: 步骤5.2当通信网络系统中有DOS攻击时,即k∈Γ(k0,k):Step 5.2 When there is a DOS attack in the communication network system, that is, k∈Γ(k 0 ,k): PID增益矩阵:PID gain matrix: 分布式PID控制协议:Distributed PID control protocol: 7.根据权利要求6所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:7. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 6 is characterized in that: 步骤6中智能通信网络系统平稳运行的条件的构建方法如下:The method for constructing the conditions for the stable operation of the intelligent communication network system in step 6 is as follows: 设计常数λ>1,0<α≤1,μ2>1,向量和向量 使得Design constant λ>1,0<α≤1, μ 2 >1, Vector Sum vector Make 其中1-[D]ii=∑i≠j[D]ij,那么,在步骤2中的分布式PID控制协议下,所述的智能通信网络系统实现了正性和一致性,增益矩阵为Where 1-[D] ii =∑ i≠j [D] ij , then, under the distributed PID control protocol in step 2, the intelligent communication network system achieves positivity and consistency, and the gain matrix is 其中1p表示所有元素均为1的p维列向量,表示第l个元素为1其余元素为0的p维列向量,并且DOS攻击持续时间满足:Where 1 p represents a p-dimensional column vector whose elements are all 1, represents a p-dimensional column vector whose lth element is 1 and the rest are 0, and the duration of the DOS attack satisfies: 8.根据权利要求7所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:8. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 7 is characterized in that: 步骤7、智能通信网络系统的正性验证过程的构建形式如下:Step 7: The construction form of the positive verification process of the intelligent communication network system is as follows: 步骤7.1根据步骤1中建立的智能通信网络的状态空间模型、步骤2中构建的PID控制协议,步骤3中构造的PID控制协议的积分部分,和步骤5中根据有无DOS攻击分为两种情况,可以得到Step 7.1 According to the state space model of the intelligent communication network established in step 1, the PID control protocol constructed in step 2, the integral part of the PID control protocol constructed in step 3, and the two cases divided according to whether there is a DOS attack in step 5, it can be obtained 当没有DOS攻击时k∈Θ(k0,k),When there is no DOS attack k∈Θ(k 0 ,k), 当有DOS攻击时k∈Γ(k0,k),When there is a DOS attack k∈Γ(k 0 ,k), 其中,IM和Iq分别是M×M维和q×q维的单位矩阵,是一个克罗内克积运算符,且Among them, I M and I q are the identity matrices of M×M and q×q dimensions respectively. is a Kronecker product operator, and 步骤7.2定义结合步骤6和步骤7.1可以得到Step 7.2 Definition Combining steps 6 and 7.1, we can get 当无DOS攻击时When there is no DOS attack 其中,in, 当有DOS攻击时When there is a DOS attack 其中,in, 令矩阵的对角线矩阵和非对角线矩阵分别为:Let the matrix and The diagonal and off-diagonal matrices of are: 步骤7.3、根据步骤6中前五个条件,设计增益矩阵和得到:Step 7.3: Based on the first five conditions in step 6, design the gain matrix and and get: 因此两种情况下的智能通信网络系统是正的。therefore The intelligent communication network system is positive in both cases. 9.根据权利要求8所述的DOS攻击下智能通信网络的模糊控制协议方法,其特征在于:9. The fuzzy control protocol method of an intelligent communication network under DOS attack according to claim 8 is characterized in that: 步骤8中智能通信网络系统的一致性验证过程如下:The consistency verification process of the intelligent communication network system in step 8 is as follows: 步骤8.1根据有无DOS攻击,选择线性余正Lyapunov函数Step 8.1 Select the linear copositive Lyapunov function based on whether there is a DOS attack or not 当k∈[k2f-2,k2f-1)时,When k∈[k 2f-2 ,k 2f-1 ), 当k∈[k2f-1,k2f),When k∈[k 2f-1 ,k 2f ), 其中,in, 步骤8.2构造的差分,Step 8.2 Construction The difference, 当k∈[k2f-2,k2f-1)时,When k∈[k 2f-2 ,k 2f-1 ), 当k∈[k2f-1,k2f)时,When k∈[k 2f-1 ,k 2f ), 步骤8.3结合步骤8.1和步骤8.2得到Step 8.3 combines steps 8.1 and 8.2 to obtain 当k∈[k2f-2,k2f-1),When k∈[k 2f-2 ,k 2f-1 ), 其中in 当k∈[k2f-1,k2f)时,When k∈[k 2f-1 ,k 2f ), 其中in 步骤8.4由步骤6中的条件可以得到:当k∈[k2f-2,k2f-1),Step 8.4 From the conditions in step 6, we can get: when k∈[k 2f-2 ,k 2f-1 ), 进一步得到:Further we get: 当k∈[k2f-1,k2f)时,When k∈[k 2f-1 ,k 2f ), 进一步得到:Further we get: 步骤8.5根据步骤8.1和步骤8.4的结论,得到两种情况下都满足条件 Step 8.5 Based on the conclusions of Step 8.1 and Step 8.4, the conditions are met in both cases.
CN202310310913.2A 2023-03-28 2023-03-28 A fuzzy control protocol method for intelligent communication networks under DOS attacks Active CN116506159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310310913.2A CN116506159B (en) 2023-03-28 2023-03-28 A fuzzy control protocol method for intelligent communication networks under DOS attacks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310310913.2A CN116506159B (en) 2023-03-28 2023-03-28 A fuzzy control protocol method for intelligent communication networks under DOS attacks

Publications (2)

Publication Number Publication Date
CN116506159A true CN116506159A (en) 2023-07-28
CN116506159B CN116506159B (en) 2025-09-30

Family

ID=87329361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310310913.2A Active CN116506159B (en) 2023-03-28 2023-03-28 A fuzzy control protocol method for intelligent communication networks under DOS attacks

Country Status (1)

Country Link
CN (1) CN116506159B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119155709A (en) * 2024-11-20 2024-12-17 北京数易科技有限公司 Unmanned aerial vehicle cluster directional access protocol optimization method, system and medium
CN119179290A (en) * 2024-11-11 2024-12-24 北京理工大学 Multi-agent elastic control method based on virtual network three-dimensional expansion under DoS attack
CN119853944A (en) * 2024-11-25 2025-04-18 天翼云科技有限公司 PID-based network attack method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160170384A1 (en) * 2014-12-11 2016-06-16 University Of New Brunswick Model predictive controller and method with correction parameter to compensate for time lag
CN109033585A (en) * 2018-07-13 2018-12-18 河海大学 The PID controller design method of uncertain network control system based on T-S fuzzy model
CN112865752A (en) * 2020-12-24 2021-05-28 南京财经大学 Filter design method based on adaptive event trigger mechanism under hybrid network attack

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160170384A1 (en) * 2014-12-11 2016-06-16 University Of New Brunswick Model predictive controller and method with correction parameter to compensate for time lag
CN109033585A (en) * 2018-07-13 2018-12-18 河海大学 The PID controller design method of uncertain network control system based on T-S fuzzy model
CN112865752A (en) * 2020-12-24 2021-05-28 南京财经大学 Filter design method based on adaptive event trigger mechanism under hybrid network attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赖绍禹;陈博;俞立;: "DoS攻击下基于切换Luenberger观测器的冗余控制", 控制理论与应用, no. 04, 30 April 2020 (2020-04-30) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119179290A (en) * 2024-11-11 2024-12-24 北京理工大学 Multi-agent elastic control method based on virtual network three-dimensional expansion under DoS attack
CN119155709A (en) * 2024-11-20 2024-12-17 北京数易科技有限公司 Unmanned aerial vehicle cluster directional access protocol optimization method, system and medium
CN119853944A (en) * 2024-11-25 2025-04-18 天翼云科技有限公司 PID-based network attack method and device

Also Published As

Publication number Publication date
CN116506159B (en) 2025-09-30

Similar Documents

Publication Publication Date Title
CN116506159A (en) A Fuzzy Control Protocol Method for Intelligent Communication Network Under DOS Attack
US8893253B2 (en) Firewall apparatus, systems, and methods employing detection of application anomalies
CN112865752B (en) Filter design method based on self-adaptive event triggering mechanism under hybrid network attack
DE60216218T2 (en) Personal firewall with space-dependent functionality
Ma Analysis of anomaly detection method for Internet of things based on deep learning
DE102016103521A1 (en) Detection of anomalies in industrial communication networks
Alcaraz et al. Policy enforcement system for secure interoperable control in distributed smart grid systems
EP2564574B1 (en) Method for filtering and processing of data in a packet switching network
Zhang et al. Event-based resilient formation control of multiagent systems
He et al. OpenFlow‐based low‐overhead and high‐accuracy SDN measurement framework
Kim et al. Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure
CN117201177A (en) Illegal network communication active monitoring strategy design method based on game framework
CN115529193A (en) Secure communication method of cloud edge collaborative tunnel
DE112022002401T5 (en) USE OF OUT-BAND COMMUNICATION CHANNELS BETWEEN PROCESS AUTOMATION NODES
CN119584136A (en) A multi-terminal communication system based on the Internet of Things
Gergeleit et al. Modeling security requirements and controls for an automated deployment of industrial IT systems
CN119629172A (en) A switch control method and system for Internet of Things based on edge computing
Guo et al. Event‐triggered distributed consensus control of nonlinear multi‐agent systems with unknown Bouc–Wen hysteresis input and DoS attacks
Barrera et al. Statistical detection of congestion in routers
CN113805482B (en) A design method for event-triggered DOFF quantized controller under deception attack
Marks et al. Optimizing the scalability of network intrusion detection systems using mobile agents
Pan et al. Secure event-triggered vehicle platooning control with proportional integral observers under denial of service attacks
SelvaKumar et al. Network Traffic Control Using AI
WO2025113957A1 (en) Access permission decision based on a capacity value of the associated data transmission connection
CN111030872A (en) Reliable control method for stable operation of communication network data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant