Logo PTI Logo FedCSIS

Position and Communication Papers of the 16th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 26

Decentralized Controller for Software Interconnected System Subject to Malicious Attacks

, ,

DOI: http://dx.doi.org/10.15439/2021F90

Citation: Position and Communication Papers of the 16th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 26, pages 211218 ()

Full text

Abstract. This paper examines the decentralized controller for a software interconnected system subject to malicious attack. The security of software interconnected system (SIS) subject to malicious attacks is discussed using Event-Triggered  Mechanism (ETM). We design a novel ETM with decentralized feedback for managing resources and keeping system stable during attacks. We use Numenta-Hierarchical Temporal Memory (N-HTM) for monitoring the ETM values. Numerical simulation of service provider system is considered for illustrating our model's effectiveness. Experiments reveal that our model stabilizes system after an average of 2s from the launch of last attack. Average consumption of the resources is reduced by 70\%.

References

  1. B. Niu, H. Li, Z. Zhang, J. Li, T. Hayat, and F. E. Alsaadi, “Adaptive neural-network-based dynamic surface control for stochastic interconnected nonlinear nonstrict-feedback systems with dead zone,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 7, pp. 1386–1398, 2018. http://dx.doi.org/10.1109/TSMC.2018.2866519
  2. J. Liu, W. Suo, L. Zha, E. Tian, and X. Xie, “Security distributed state estimation for nonlinear networked systems against dos attacks,” International Journal of Robust and Nonlinear Control, vol. 30, no. 3, pp. 1156–1180, 2020. http://dx.doi.org/10.1002/rnc.4815
  3. D. Ye and T.-Y. Zhang, “Summation detector for false data-injection attack in cyber-physical systems,” IEEE transactions on cybernetics, vol. 50, no. 6, pp. 2338–2345, 2019. http://dx.doi.org/10.1109/tcyb.2019.2915124
  4. L. An and G.-H. Yang, “Secure state estimation against sparse sensor attacks with adaptive switching mechanism,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2596–2603, 2017. http://dx.doi.org/10.1109/tac.2017.2766759
  5. K. Wang, E. Tian, J. Liu, L. Wei, and D. Yue, “Resilient control of networked control systems under deception attacks: a memory-event-triggered communication scheme,” International Journal of Robust and Nonlinear Control, vol. 30, no. 4, pp. 1534–1548, 2020. http://dx.doi.org/10.1002/rnc.4837
  6. D. Ding, Z. Wang, D. W. Ho, and G. Wei, “Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks,” Automatica, vol. 78, pp. 231–240, 2017. http://dx.doi.org/10.1201/9780429465901-16
  7. J. Xu, Y. Tang, W. Yang, F. Li, and L. Shi, “Event-triggered minimax state estimation with a relative entropy constraint,” Automatica, vol. 110, p. 108592, 2019. http://dx.doi.org/10.1016/j.automatica.2019.108592
  8. Z. Fei, X. Wang, M. Liu, and J. Yu, “Reliable control for vehicle active suspension systems under event-triggered scheme with frequency range limitation,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. http://dx.doi.org/10.1109/tsmc.2019.2899942
  9. E. Tian, Z. Wang, L. Zou, and D. Yue, “Probabilistic-constrained filtering for a class of nonlinear systems with improved static event-triggered communication,” International Journal of Robust and Nonlinear Control, vol. 29, no. 5, pp. 1484–1498, 2019. http://dx.doi.org/10.1002/rnc.4447
  10. S. Ahmad, A. Lavin, S. Purdy, and Z. Agha, “Unsupervised real-time anomaly detection for streaming data,” Neurocomputing, vol. 262, pp. 134–147, 2017. [Online]. Available: https://doi.org/10.1016/j.neucom.2017.04.070
  11. Z. Gu, J. H. Park, D. Yue, Z.-G. Wu, and X. Xie, “Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020. http://dx.doi.org/10.1109/tsmc.2019.2960115
  12. H. Liang, Y. Zhang, T. Huang, and H. Ma, “Prescribed performance cooperative control for multiagent systems with input quantization,” IEEE Transactions on cybernetics, vol. 50, no. 5, pp. 1810–1819, 2019. http://dx.doi.org/10.1109/tcyb.2019.2893645
  13. Y. Tang, D. Zhang, D. W. Ho, W. Yang, and B. Wang, “Event-based tracking control of mobile robot with denial-of-service attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 9, pp. 3300–3310, 2018. http://dx.doi.org/10.1109/tsmc.2018.2875793
  14. P. Kishore, S. K. Barisal, and D. P. Mohapatra, “An incremental malware detection model for meta-feature api and system call sequence,” in 2020 15th Conference on Computer Science and Information Systems (FedCSIS). IEEE, 2020. http://dx.doi.org/10.15439/2020f73 pp. 629–638.