This article studies the stability issue of networked switched systems (NSSs) under denial-of-service (DoS) attacks. To address this issue, the derived limitations imposed on both the frequency of DoS attacks on each subsystem and the upper limit of attack duration that each subsystem can tolerate are mode-dependent, which is more efficient and flexible than the current results for NSSs. Moreover, we reveal the relationship between the upper bound of the average maximum tolerable attack duration associated with the corresponding subsystem and the actual mode-dependent average dwell time. Furthermore, we identify that the total tolerable DoS attack duration as a percentage of the system runtime in this article can be higher than existing results. Finally, an example is given to demonstrate the effectiveness of our work.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2023.3348192 | DOI Listing |
ISA Trans
December 2024
School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China. Electronic address:
Denial-of-service (DoS) attacks and antagonistic interactions may exist in complex networks, which will destroy cooperative communication between agents and thus cannot realize collaborative tasks. Therefore, this paper studies time-varying formation tracking (TVFT) of heterogeneous multi-agent systems (HMASs) with DoS attacks and cooperative-antagonistic interactions. It aims to ensure system communication connectivity and allow followers to achieve distributed secure bipartite TVFT.
View Article and Find Full Text PDFPLoS One
December 2024
RIOTU Lab, CCIS, Prince Sultan University, Riyadh, Saudi Arabia.
Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure road safety. However, VN are vulnerable to Distributed Denial of Service (DDoS) attacks, posing severe threats in the contemporary Internet landscape.
View Article and Find Full Text PDFNeotrop Entomol
December 2024
Programa de Pós-Graduação Em Produção Vegetal, Univ Federal Dos Vales Jequitinhonha E Mucuri, Diamantina, MG, Brazil.
Neural Netw
December 2024
School of Mathematical Science, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan, China. Electronic address:
This article is concerned with the deterministic finite automaton-mode-dependent (DFAMD) exponential stability problem of impulsive switched memristive neural networks (SMNNs) with aperiodic asynchronous attacks and the network covert channel. First, unlike the existing literature on SMNNs, this article focuses on DFA to drive mode switching, which facilitates precise system behavior modeling based on deterministic rules and input characters. To eliminate the periodicity and consistency constraints of traditional attacks, this article presents the multichannel aperiodic asynchronous denial-of-service (DoS) attacks, allowing for the diversity of attack sequences.
View Article and Find Full Text PDFSensors (Basel)
November 2024
SMART Technology Research Centre, Department of Cyber Security and Networks, School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UK.
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While machine learning-based IDS have typically been deployed at the edge (gateways) or in the cloud, in the absence of gateways, the IDS must be embedded within the sensor nodes themselves.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!