This article studies the stability issue of networked switched systems (NSSs) under denial-of-service (DoS) attacks. To address this issue, the derived limitations imposed on both the frequency of DoS attacks on each subsystem and the upper limit of attack duration that each subsystem can tolerate are mode-dependent, which is more efficient and flexible than the current results for NSSs. Moreover, we reveal the relationship between the upper bound of the average maximum tolerable attack duration associated with the corresponding subsystem and the actual mode-dependent average dwell time. Furthermore, we identify that the total tolerable DoS attack duration as a percentage of the system runtime in this article can be higher than existing results. Finally, an example is given to demonstrate the effectiveness of our work.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2023.3348192DOI Listing

Publication Analysis

Top Keywords

dos attacks
12
attack duration
12
networked switched
8
switched systems
8
stabilization networked
4
dos
4
systems dos
4
attacks article
4
article studies
4
studies stability
4

Similar Publications

Denial-of-service (DoS) attacks and antagonistic interactions may exist in complex networks, which will destroy cooperative communication between agents and thus cannot realize collaborative tasks. Therefore, this paper studies time-varying formation tracking (TVFT) of heterogeneous multi-agent systems (HMASs) with DoS attacks and cooperative-antagonistic interactions. It aims to ensure system communication connectivity and allow followers to achieve distributed secure bipartite TVFT.

View Article and Find Full Text PDF

Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure road safety. However, VN are vulnerable to Distributed Denial of Service (DDoS) attacks, posing severe threats in the contemporary Internet landscape.

View Article and Find Full Text PDF

Risk Analysis for Invasion of the Forest Pest Paropsisterna bimaculata Present in Tasmania to Areas of the World.

Neotrop Entomol

December 2024

Programa de Pós-Graduação Em Produção Vegetal, Univ Federal Dos Vales Jequitinhonha E Mucuri, Diamantina, MG, Brazil.

Article Synopsis
  • Paropsisterna bimaculata is a harmful pest for eucalyptus trees, leading to significant defoliation and even tree death in Tasmanian plantations, impacting wood production.
  • The study focused on creating an ecoclimatic index model using CLIMEX software to predict where this pest might spread globally, identifying high-risk areas for eucalyptus crops.
  • Results indicated that regions with temperate climates across Asia, Africa, Europe, Oceania, and America are especially vulnerable, with a notable risk present in Brazil's southern and southeastern areas, guiding prevention strategies.
View Article and Find Full Text PDF

This article is concerned with the deterministic finite automaton-mode-dependent (DFAMD) exponential stability problem of impulsive switched memristive neural networks (SMNNs) with aperiodic asynchronous attacks and the network covert channel. First, unlike the existing literature on SMNNs, this article focuses on DFA to drive mode switching, which facilitates precise system behavior modeling based on deterministic rules and input characters. To eliminate the periodicity and consistency constraints of traditional attacks, this article presents the multichannel aperiodic asynchronous denial-of-service (DoS) attacks, allowing for the diversity of attack sequences.

View Article and Find Full Text PDF

Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security.

Sensors (Basel)

November 2024

SMART Technology Research Centre, Department of Cyber Security and Networks, School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UK.

IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While machine learning-based IDS have typically been deployed at the edge (gateways) or in the cloud, in the absence of gateways, the IDS must be embedded within the sensor nodes themselves.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!