Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context ...Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context of an attack graph describes the length or number of steps that the attacker has to take in achieving the goal state. However, EPL varies and it is based on the “state of vulnerabilities” [2] [3] in a given computer system. Any vulnerability throughout its life cycle passes through several stages that we identify as “states of the vulnerability life cycle” [2] [3]. In our previous studies we have developed mathematical models using Markovian theory to estimate the probability of a given vulnerability being in a particular state of its life cycle. There, we have considered a typical model of a computer network system with two computers subject to three vulnerabilities, and developed a method driven by an algorithm to estimate the EPL of this network system as a function of time. This approach is important because it allows us to monitor a computer system during the process of being exploited. Proposed non-homogeneous model in this study estimates the behavior of the EPL as a function of time and therefore act as an index of the risk associated with the network system getting exploited.展开更多
The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to rese...The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method.展开更多
文章研究了随机脉冲协议下的多智能体系统的包容控制问题,即跟随者能够在一定状态下收敛到由多个领导者组成的凸包上,这里随机脉冲被用来描述脉冲控制过程中的随机控制效果。假设脉冲协议是时间触发的,研究了多智能体系统在随机拒绝服务...文章研究了随机脉冲协议下的多智能体系统的包容控制问题,即跟随者能够在一定状态下收敛到由多个领导者组成的凸包上,这里随机脉冲被用来描述脉冲控制过程中的随机控制效果。假设脉冲协议是时间触发的,研究了多智能体系统在随机拒绝服务(Denial of Service,DoS)攻击下的脉冲包容控制问题,即当脉冲控制受到随机拒绝服务攻击时,提出一种时变概率来描述每个脉冲控制系统遭受拒绝服务攻击的可能性,并获得了确保包容控制在期望意义上实现的充分条件。展开更多
文摘Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context of an attack graph describes the length or number of steps that the attacker has to take in achieving the goal state. However, EPL varies and it is based on the “state of vulnerabilities” [2] [3] in a given computer system. Any vulnerability throughout its life cycle passes through several stages that we identify as “states of the vulnerability life cycle” [2] [3]. In our previous studies we have developed mathematical models using Markovian theory to estimate the probability of a given vulnerability being in a particular state of its life cycle. There, we have considered a typical model of a computer network system with two computers subject to three vulnerabilities, and developed a method driven by an algorithm to estimate the EPL of this network system as a function of time. This approach is important because it allows us to monitor a computer system during the process of being exploited. Proposed non-homogeneous model in this study estimates the behavior of the EPL as a function of time and therefore act as an index of the risk associated with the network system getting exploited.
基金the NNSF of China under Grants 61973199,62003794,62173214the Shandong Provincial NSF ZR2020QF050,ZR2021MF003。
文摘The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method.
文摘文章研究了随机脉冲协议下的多智能体系统的包容控制问题,即跟随者能够在一定状态下收敛到由多个领导者组成的凸包上,这里随机脉冲被用来描述脉冲控制过程中的随机控制效果。假设脉冲协议是时间触发的,研究了多智能体系统在随机拒绝服务(Denial of Service,DoS)攻击下的脉冲包容控制问题,即当脉冲控制受到随机拒绝服务攻击时,提出一种时变概率来描述每个脉冲控制系统遭受拒绝服务攻击的可能性,并获得了确保包容控制在期望意义上实现的充分条件。