[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115643579A - Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC - Google Patents

Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC Download PDF

Info

Publication number
CN115643579A
CN115643579A CN202210896796.8A CN202210896796A CN115643579A CN 115643579 A CN115643579 A CN 115643579A CN 202210896796 A CN202210896796 A CN 202210896796A CN 115643579 A CN115643579 A CN 115643579A
Authority
CN
China
Prior art keywords
network
nodes
plc
node
susceptible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210896796.8A
Other languages
Chinese (zh)
Inventor
刘贵云
张朝峻
梁忠伟
钟晓静
程乐峰
刘晓初
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou University
Original Assignee
Guangzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou University filed Critical Guangzhou University
Priority to CN202210896796.8A priority Critical patent/CN115643579A/en
Publication of CN115643579A publication Critical patent/CN115643579A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention discloses a power distribution network information physical system malicious program control method based on a PC-PLC, which comprises the following steps: s1: PL and PLC network nodes are divided based on real problem analysis; s2: constructing a network node state transition diagram; s3: constructing a differential equation set of a malicious program propagation model; s4: a control strategy is proposed; s5: constructing a cost function; s6: constructing a Lagrange function, and introducing a Lagrange multiplier; s7: constructing a Hamiltonian; s8: constructing a covariate equation set and a cross-section condition; s9: and solving the optimal control pair. According to the method, the cost function for controlling the malicious program is constructed, the Hamilton equation is constructed according to the differential equation of the model and the cost function, the collaborative equation set and the optimal control pair are solved, and the purpose that a better control effect is achieved with the minimum cost is achieved.

Description

一种基于PC-PLC配电网信息物理系统恶意程序控制方法A malicious program control method based on PC-PLC distribution network cyber-physical system

技术领域technical field

本发明涉及无线可充电传感器网络技术领域,特别涉及一种基于PC-PLC 配电网信息物理系统恶意程序控制方法,进行对电力系统的无线充电传感器网 络恶意程序传播建模及最优控制。The present invention relates to the technical field of wireless rechargeable sensor networks, in particular to a method for controlling malicious programs in a cyber-physical system of a PC-PLC power distribution network for modeling and optimal control of malicious program propagation in a wireless charging sensor network of a power system.

背景技术Background technique

近年来,随着无线可充电传感器网络技术的迅速发展,其应用也日益普遍, 军事、农业、工业、交通、信息设备等领域都可见其身影。电力行业作为国民 经济发展的基础,为快速响应社会用电需求,同时做到实时安全灵活的信息交 流,实现资源的合理优化与有效调度,传统的电力网已经不能满足电力发展的 需要,现代电力系统已发展成为电力网与信息网深度融合的电力信息物理系统。In recent years, with the rapid development of wireless rechargeable sensor network technology, its application is becoming more and more common, and it can be seen in military, agriculture, industry, transportation, information equipment and other fields. As the foundation of national economic development, the power industry, in order to quickly respond to social electricity demand, achieve real-time safe and flexible information exchange, and realize reasonable optimization and effective scheduling of resources. The traditional power grid can no longer meet the needs of power development. The modern power system It has developed into a power cyber-physical system with deep integration of power grid and information network.

现代电力信息物理系统,在传统电力网物理层的基础上,耦合了信息层, 通过大量的传感器连接进行相互通信以实现对其目标区域内信息的实时感知、 检测、处理。然而,电网在享受电力信息物理系统带来的好处——使现代电网 运行更加经济高效的同时,也需要承担智能互联给电力系统运行带来的安全方 面潜在的风险。就现代电力信息物理系统而言,在发电、输电、配电及用电的 各个环节均可能遭到恶意程序的网络攻击,系统的可用性、完整性、保密性等 将遭到不同程度的破坏,严重的甚至会造成整个电力网瘫痪。因此,现代电力 网络的安全问题不容忽视。The modern power cyber-physical system, on the basis of the physical layer of the traditional power network, couples the information layer, and communicates with each other through a large number of sensor connections to achieve real-time perception, detection, and processing of information in its target area. However, while the power grid enjoys the benefits brought by the power cyber-physical system—making the operation of the modern power grid more cost-effective and efficient—it also needs to bear the potential security risks brought by intelligent interconnection to the power system operation. As far as the modern power cyber-physical system is concerned, all aspects of power generation, power transmission, power distribution, and power consumption may be attacked by malicious programs, and the availability, integrity, and confidentiality of the system will be damaged to varying degrees. Severe cases may even cause the entire power grid to be paralyzed. Therefore, the security issues of modern power networks cannot be ignored.

立足现代电力网潜在的信息安全威胁,充分考虑恶意程序传播、感染机制, 建立出切合实际的网络模型以分析研究出最优控制策略来抑制恶意程序传播、 保障网络信息的安全性是当今一个重要的课题。Based on the potential information security threats of modern power grids, fully considering the spread and infection mechanism of malicious programs, establishing a realistic network model to analyze and research the optimal control strategy to suppress the spread of malicious programs and ensure the security of network information is an important task today. topic.

发明内容Contents of the invention

为预防及应对恶意程序对电力信息物理系统信息造成的不良影响,本发明 提供一种基于非线性时滞异构模型的PC-PLC配电网信息物理系统恶意程序传 播模型,以解决上述问题。In order to prevent and deal with the adverse effects of malicious programs on the information of electric power cyber-physical systems, the present invention provides a PC-PLC power distribution network cyber-physical system malicious program propagation model based on nonlinear time-delay heterogeneous model to solve the above problems.

本发明提供如下的技术方案:The present invention provides following technical scheme:

一种基于PC-PLC配电网信息物理系统恶意程序控制方法,包括以下步骤:A malicious program control method based on a PC-PLC power distribution network cyber-physical system, comprising the following steps:

S1:基于现实问题分析划分PL、PLC网络节点;S1: Divide PL and PLC network nodes based on analysis of real problems;

S2:构建网络节点状态转移图;S2: Build a network node state transition diagram;

S3:构建恶意程序传播模型的微分方程组;S3: Differential equations for building a malicious program propagation model;

S4:提出控制策略;S4: propose control strategy;

S5:构建成本代价函数;S5: Build a cost function;

S6:构造拉格朗日函数,引入拉格朗日乘子;S6: Construct a Lagrangian function and introduce a Lagrangian multiplier;

S7:构造哈密顿函数;S7: Construct a Hamiltonian function;

S8:构建协态变量方程组和横截条件;S8: Construct costate variable equations and transversal conditions;

S9:求解最优控制对。S9: Solve the optimal control pair.

优选的,所述步骤S1中,将计算机PC网络和可编程控制器PLC网络分 别记为A网络以及B网络,A网络和B网络的每一台设备对应一个节点,并根 据节点被感染的程度,将其分类为感染节点、易感节点、免疫节点和隔离节点。 优选的,所述S2中,从T中的所有文本x中,包括对抗样本和干净样本,选取 最重要的k个单词,并对其进行排序,记为C(x)。Preferably, in the step S1, the computer PC network and the programmable controller PLC network are recorded as the A network and the B network respectively, and each device of the A network and the B network corresponds to a node, and according to the degree of infection of the node , classifying them as infected nodes, susceptible nodes, immune nodes and isolated nodes. Preferably, in said S2, from all texts x in T, including adversarial samples and clean samples, select the most important k words, and sort them, denoted as C(x).

优选的,所述步骤S3中,基于网络节点状态转移图构建微分方程组,具 体如下:Preferably, in the step S3, the system of differential equations is constructed based on the network node state transition diagram, specifically as follows:

Figure BDA0003769200900000031
Figure BDA0003769200900000031

Figure BDA0003769200900000032
Figure BDA0003769200900000032

Figure BDA0003769200900000033
Figure BDA0003769200900000033

Figure BDA0003769200900000034
Figure BDA0003769200900000034

Figure BDA0003769200900000035
Figure BDA0003769200900000035

Figure BDA0003769200900000036
Figure BDA0003769200900000036

Figure BDA0003769200900000037
Figure BDA0003769200900000037

式中,θxy(t)定义为易感节点具有相邻的感染节点的概率,x=1,2;y=1,2, 其中“1”代表PC网络,“2”代表PLC网络,即:In the formula, θ xy (t) is defined as the probability that a susceptible node has an adjacent infected node, x=1,2; y=1,2, where "1" represents the PC network, and "2" represents the PLC network, namely :

θ11(t)代表PC易感节点与PC感染节点相邻的概率,θ12(t)代表PC易感节 点与PLC感染节点相邻的概率,θ21(t)代表PLC易感节点与PC感染节点相邻 的概率,θ22(t)代表PLC易感节点与PLC感染节点相邻的概率,具体如下:θ 11 (t) represents the probability that a PC-susceptible node is adjacent to a PC-infected node, θ 12 (t) represents the probability that a PC-susceptible node is adjacent to a PLC-infected node, and θ 21 (t) represents the probability that a PLC-susceptible node is adjacent to a PC The probability that the infected node is adjacent, θ 22 (t) represents the probability that the PLC susceptible node is adjacent to the PLC infected node, as follows:

Figure BDA0003769200900000038
Figure BDA0003769200900000038

Figure BDA0003769200900000039
Figure BDA0003769200900000039

Figure BDA0003769200900000041
Figure BDA0003769200900000041

Figure BDA0003769200900000042
Figure BDA0003769200900000042

Figure BDA0003769200900000043
分别是在t时刻PC网络度为(i,j)的易感节点(S)、感染节点(I)、隔离节点(Q)、免疫节点(R)的数量,
Figure BDA0003769200900000044
分别是在t时刻PLC网络度为(k,l)的易感节点、感染节点、免疫节点的数量,
Figure BDA0003769200900000045
为PC网络度为(i,j)的各节点总数,
Figure BDA0003769200900000046
为PLC网络度为(k,l)的各节点总数;一 个PC节点的度,用(i,j)表示,即表示为PC网络的某个节点与i个其他PC节点 及j个PLC节点相连接;一个PLC节点的度,用(k,l)表示,即意为PLC网络的 某个节点与k个其他PLC节点及,l个PC节点相连接;同时,任意时刻满足以 下关系:
Figure BDA0003769200900000043
are the number of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree (i, j) at time t,
Figure BDA0003769200900000044
are the number of susceptible nodes, infected nodes and immune nodes with PLC network degree (k,l) at time t, respectively,
Figure BDA0003769200900000045
is the total number of nodes with PC network degree (i, j),
Figure BDA0003769200900000046
is the total number of nodes in the PLC network whose degree is (k, l); the degree of a PC node is expressed by (i, j), which means that a node in the PC network is related to i other PC nodes and j PLC nodes Connection; the degree of a PLC node is represented by (k,l), which means that a node in the PLC network is connected to k other PLC nodes and l PC nodes; at the same time, the following relationship is satisfied at any time:

Figure BDA0003769200900000047
Figure BDA0003769200900000047

Figure BDA0003769200900000048
Figure BDA0003769200900000048

γ1、γ2分别为PC、PLC网络感染节点病毒查杀率;μ1为PC网络节点出生 率及死亡率,μ2为PLC网络节点出生率及死亡率;b为PC网络免疫节点出生 占比;1-b为PC网络易感节点出生占比;θ1为PC网络易感节点由PLC网络 引起的感染率;θ2为PLC网络易感节点由PC网络引起的感染率;δ1为PC网 络感染节点隔离率;ω1为PC网络隔离节点恢复率;η1、η2为PC、PLC网络免 疫节点失免率;τ1为PC网络免疫节点失去免疫能力的延时,τ2为PLC网络免 疫节点失去免疫能力的延时;β1、β2、β3、β4、c、d、g、h均为正常数。γ 1 and γ 2 are the virus detection and killing rates of PC and PLC network infection nodes respectively; μ 1 is the birth rate and death rate of PC network nodes, and μ 2 is the birth rate and death rate of PLC network nodes; b is the proportion of births of PC network immune nodes; 1-b is the birth ratio of PC network susceptible nodes; θ 1 is the infection rate of PC network susceptible nodes caused by PLC network; θ 2 is the infection rate of PLC network susceptible nodes caused by PC network; δ 1 is the infection rate of PC network Infection node isolation rate; ω 1 is PC network isolation node recovery rate; η 1 , η 2 is PC, PLC network immune node loss rate; τ 1 is the delay of PC network immune node losing immunity, τ 2 is PLC network Delay of immune node losing immunity; β 1 , β 2 , β 3 , β 4 , c, d, g, h are all normal numbers.

更优的,所述步骤S4中,控制策略包括对感染节点进行查杀并注射免疫 补丁、加大对感染节点移除隔离、对隔离节点进行查杀并注射免疫补丁以及加 大新投放的节点中免疫节点的占比;More preferably, in the step S4, the control strategy includes killing infected nodes and injecting immune patches, increasing the removal and isolation of infected nodes, killing isolated nodes and injecting immune patches, and increasing the number of newly launched nodes The proportion of immune nodes in the middle;

选取γ1、γ2、b、δ1、ω1作为优化控制变量,优化控制变量的可行域为 U={u=(γ12,b,δ11)|,0≤γ1≤1,0≤γ2≤1,0≤b≤1,0≤δ1≤1,0≤ ω1≤1,t∈[0,tf]},tf表示本次最优控制的终端时刻。Select γ 1 , γ 2 , b, δ 1 , and ω 1 as optimal control variables, and the feasible region of optimal control variables is U={u=(γ 12 ,b,δ 11 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ ω 1 ≤1,t∈[0,t f ]}, t f represents the optimal control terminal moment.

更优的,所述步骤S5中,成本代价函数用J(γ12,b,δ11)表示,,通过以 下公式确定:More preferably, in the step S5, the cost function is represented by J(γ 12 ,b,δ 11 ), and is determined by the following formula:

Figure BDA0003769200900000051
Figure BDA0003769200900000051

其中u1(t)=γ1,u2(t)=γ2,u3(t)=b,u4(t)=δ1,u5(t)=ω1where u 1 (t)=γ 1 , u 2 (t)=γ 2 , u 3 (t)=b, u 4 (t)=δ 1 , u 5 (t)=ω 1 .

更优的,所述S6中,构造的拉格朗日函数如下:More preferably, in said S6, the constructed Lagrangian function is as follows:

Figure BDA0003769200900000052
Figure BDA0003769200900000052

更优的,所述S7中,构造的哈密顿函数如下:More preferably, in said S7, the constructed Hamiltonian function is as follows:

Figure BDA0003769200900000053
Figure BDA0003769200900000053

Figure RE-GDA0004016178910000061
Figure RE-GDA0004016178910000061

其中,λi(t),(i=1,2,3,4,5,6,7)为最优控制的协态变量。Among them, λ i (t), (i=1, 2, 3, 4, 5, 6, 7) is the optimally controlled co-state variable.

更优的,所述步骤S8中,构建的横截条件如下:More preferably, in said step S8, the transversal conditions of construction are as follows:

λi(tf)=0,i=1,2,3,4,5,6,7。λ i (t f )=0, i=1,2,3,4,5,6,7.

更优的,所述S8中,协态方程为:More optimally, in said S8, the co-state equation is:

Figure BDA0003769200900000062
Figure BDA0003769200900000062

其中,x1,x2,x3,x4,x5,x4,x7依次对应

Figure BDA0003769200900000063
七个变量。Among them, x 1 , x 2 , x 3 , x 4 , x 5 , x 4 , x 7 correspond in turn
Figure BDA0003769200900000063
seven variables.

更优的,所述S9中,系统最终的最优控制对为:More optimally, in said S9, the final optimal control pair of the system is:

Figure BDA0003769200900000064
Figure BDA0003769200900000064

本发明的有益效果为:The beneficial effects of the present invention are:

本发明充分考虑了目前的现实状况后用来模拟现实中PC-PLC配电网信息 物理系统的无线可充电传感器网络中恶意程序传播的情况:考虑了非线性感染 率,恶意程序感染传感器节点的能力并非固定不变,早期研究中假设的双线性 发生率与标准发生率都是极端的理想情况;考虑了异构,目前的电力网用到的 可充电传感器往往具有异构,异构可充电传感器以其良好的网络稳定性、可靠 性和生存性得到了广泛的应用于复杂场景;考虑了时滞,现实中恶意程序感染 传感器免疫节点并不能一下子使之失去免疫能力,往往有一定的延时,而且对 不同网络的延时不同。针对建立的PC-PLC配电网信息物理系统恶意程序传播 模型进行控制,提供了最优控制方案:构建针对控制恶意程序的成本代价函数, 根据模型的微分方程及成本代价函数构建哈密尔顿方程,求解协态方程组、最 优控制对,实现以最小的代价达到较好的控制效果。The present invention fully considers the current reality and is used to simulate the propagation of malicious programs in the wireless rechargeable sensor network of the PC-PLC distribution network information physical system in reality: considering the nonlinear infection rate, the rate of malicious programs infecting sensor nodes The capacity is not fixed. The bilinear incidence rate and the standard incidence rate assumed in the early research are extreme ideals; considering heterogeneity, the rechargeable sensors used in the current power grid often have heterogeneity, and heterogeneity can be recharged. Sensors have been widely used in complex scenarios due to their good network stability, reliability, and survivability; considering the time lag, in reality, malicious programs infecting sensor immune nodes cannot make them lose immunity all at once, and often have a certain Delay, and the delay is different for different networks. For the control of the established PC-PLC distribution network cyber-physical system malicious program propagation model, an optimal control scheme is provided: construct a cost function for controlling malicious programs, construct the Hamiltonian equation according to the differential equation and cost function of the model, and solve Co-state equations and optimal control pairs achieve better control effects at the lowest cost.

附图说明Description of drawings

利用附图对本发明作进一步说明,但附图中的实施例不构成对本发明的任 何限制,对于本领域的普通技术人员,在不付出创造性劳动的前提下,还可以 根据以下附图获得其它的附图。The present invention is further described by using the accompanying drawings, but the embodiments in the accompanying drawings do not constitute any limitation to the present invention. For those of ordinary skill in the art, without paying creative work, other embodiments can also be obtained according to the following accompanying drawings Attached picture.

图1是本发明基于PC-PLC配电网信息物理系统恶意程序控制方法流程图;Fig. 1 is the flow chart of the malicious program control method based on PC-PLC distribution network information physical system of the present invention;

图2是本发明PC、PLC无线可充电传感器网络的状态转化图。Fig. 2 is a state transition diagram of the PC and PLC wireless rechargeable sensor network of the present invention.

具体实施方式Detailed ways

以下结合具体实施例对基于PC-PLC配电网信息物理系统恶意程序控制方 法作进一步的详细描述,这些实施例只用于比较和解释的目的,本发明不限定 于这些实施例中。Below in conjunction with specific embodiment the malicious program control method based on PC-PLC power distribution network information physics system is described in further detail, and these embodiments are only used for the purpose of comparison and explanation, and the present invention is not limited in these embodiments.

实施例Example

为预防及应对恶意程序对电力信息物理系统信息造成的不良影响,本发明 实施例提供的基于非线性时滞异构模型的PC-PLC配电网信息物理系统恶意程 序传播模型,并提供了对应的最优控制方法。In order to prevent and deal with the adverse effects of malicious programs on the information of electric power cyber-physical systems, the embodiment of the present invention provides a PC-PLC power distribution network cyber-physical system malicious program propagation model based on nonlinear time-delay heterogeneous model, and provides corresponding optimal control method.

如图1所示,该基于PC-PLC配电网信息物理系统恶意程序控制方法,包 括以下步骤:As shown in Figure 1, the malicious program control method based on the PC-PLC power distribution network cyber-physical system includes the following steps:

S1:基于现实问题分析划分PL、PLC网络节点;S1: Divide PL and PLC network nodes based on analysis of real problems;

构建PC-PLC配电网信息物理系统恶意程序传播模型建模,将计算机网络 (PC网络)和可编程控制器网络(PLC网络)记为A网络以及B网络,A网络 和B网络的每一台设备对应一个节点,并根据节点被感染的程度,将其分类为 感染节点、易感节点、免疫节点和隔离节点。Build a PC-PLC power distribution network cyber-physical system malicious program propagation model modeling, record the computer network (PC network) and programmable controller network (PLC network) as A network and B network, each of A network and B network Each device corresponds to a node, and according to the degree of infection of the node, it is classified into infected nodes, susceptible nodes, immune nodes and isolated nodes.

S2:构建网络节点状态转移图;S2: Build a network node state transition diagram;

构建如图2所示的PC、PLC无线可充电传感器网络的状态转化图,假设 PC网络(A)包括易感状态节点(S)、感染状态节点(I)、隔离状态节点(Q) 以及免疫状态节点(R),PLC网络(B)包括易感状态节点(S)、感染状态节 点(I)、免疫状态节点(R),网络节点总数为N。假设PC网络的状态节点出 生率为μ1,新出生的状态节点有易感状态节点和免疫状态节点,其中,易感状 态节点占比为1-b,免疫状态节点占比为b;PLC网络的状态节点出生率为μ2, 新出生的节点均为易感状态节点。Construct the state transition diagram of PC and PLC wireless rechargeable sensor network as shown in Figure 2, assuming that the PC network (A) includes susceptible state nodes (S), infected state nodes (I), isolated state nodes (Q) and immune State node (R), PLC network (B) includes susceptibility state node (S), infection state node (I), immune state node (R), and the total number of network nodes is N. Assuming that the birth rate of state nodes in PC network is μ 1 , newly born state nodes include susceptible state nodes and immune state nodes, among which, the proportion of susceptible state nodes is 1-b, and the proportion of immune state nodes is b; the proportion of newly born state nodes in PLC network is The state node birth rate is μ 2 , and the newly born nodes are all susceptible state nodes.

定义γ1、γ2分别为PC、PLC网络感染状态节点病毒查杀率;μ1为PC网络 状态节点出生率及死亡率,μ2为PLC网络状态节点出生率及死亡率;b为PC 网络免疫状态节点出生占比;1-b为PC网络易感状态节点出生占比;θ1为PC网络易感状态节点由PLC网络引起的感染率;θ2为PLC网络易感状态节点 由PC网络引起的感染率;δ1为PC网络感染状态节点隔离率;ω1为PC网络隔 离状态节点恢复率;η1、η2为PC、PLC网络免疫状态节点失免率;τ1为PC网 络免疫状态节点失去免疫能力的延时,τ2为PLC网络免疫状态节点失去免疫能 力的延时;β1、β2、β3、β4、c、d、g、h均为正常数。Definition γ 1 and γ 2 are the virus killing rate of PC and PLC network infection status nodes respectively; μ 1 is the birth rate and death rate of PC network status nodes, μ 2 is the birth rate and death rate of PLC network status nodes; b is the immune status of PC network The birth ratio of nodes; 1-b is the birth ratio of nodes in the susceptible state of the PC network; θ 1 is the infection rate of nodes in the susceptible state of the PC network caused by the PLC network; θ 2 is the infection rate of nodes in the susceptible state of the PLC network caused by the PC network Infection rate; δ 1 is the PC network infection state node isolation rate; ω 1 is the PC network isolation state node recovery rate; η 1 , η 2 is the PC, PLC network immune state node loss rate; τ 1 is the PC network immune state node Delay of losing immunity, τ 2 is the delay of losing immunity of PLC network immune status nodes; β 1 , β 2 , β 3 , β 4 , c, d, g, h are all normal numbers.

对于PC网络易感节点,有新生节点投入,部分可能会被PC网络的感染状 态节点感染变为感染状态节点,也可能会被PLC网络的感染状态节点感染变为 感染状态节点,还有部分可能会因死亡移除。对于PC网络感染状态节点,部 分会被隔离,部分会被通过病毒查杀打补丁等措施变为免疫状态节点,还有部 分可能会因死亡移除。对于PC网络隔离节点,部分会被治疗恢复变为免疫状 态节点,还有部分会因死亡移除。对于PC网络免疫状态节点,有新生节点投 入,部分可能会失去免疫能力变为易感状态节点,还有部分可能会因死亡移除。For PC network susceptible nodes, if there are new nodes invested, some of them may be infected by infected nodes of PC network and become infected nodes, and may also be infected by infected nodes of PLC network and become infected nodes, and some may Will be removed on death. For PC network infection state nodes, some will be isolated, some will be turned into immune state nodes through measures such as virus inspection, killing and patching, and some may be removed due to death. For PC network isolation nodes, some will be recovered by treatment and become immune state nodes, and some will be removed due to death. For the PC network immune state nodes, there are new nodes input, some may lose immunity and become susceptible state nodes, and some may be removed due to death.

对于PLC网络易感节点,有新生节点投入,部分可能会被PLC网络的感 染状态节点感染变为感染状态节点,也可能会被PC网络的感染状态节点感染 变为感染状态节点,还有部分可能会因死亡移除。对于PLC网络感染节点,部 分会被通过病毒查杀打补丁等措施变为免疫状态节点,还有部分可能会因死亡 移除。对于PLC网络免疫状态节点,部分可能会失去免疫能力变为易感状态节 点,还有部分可能会因死亡移除。For PLC network susceptible nodes, if there are new nodes invested, some of them may be infected by the infection state nodes of the PLC network and become infected state nodes, or may be infected by the infection state nodes of the PC network and become infected state nodes, and some may Will be removed on death. For PLC network infection nodes, some will be turned into immune state nodes through measures such as virus inspection, killing and patching, and some may be removed due to death. For PLC network immune state nodes, some may lose immunity and become susceptible state nodes, and some may be removed due to death.

定义θxy(t)为易感节点具有相邻的感染状态节点的概率,x=1,2;y=1,2, 其中“1”代表PC网络,“2”代表PLC网络,即:Define θ xy (t) as the probability that a susceptible node has an adjacent infected node, x=1,2; y=1,2, where "1" represents the PC network, and "2" represents the PLC network, namely:

θ11(t)代表PC易感状态节点与PC感染状态节点相邻的概率,θ12(t)代表 PC易感状态节点与PLC感染状态节点相邻的概率,θ21(t)代表PLC易感状态 节点与PC感染状态节点相邻的概率,θ22(t)代表PLC易感状态节点与PLC感 染状态节点相邻的概率,具体如下:θ 11 (t) represents the probability that a PC susceptible state node is adjacent to a PC infected state node, θ 12 (t) represents the probability that a PC susceptible state node is adjacent to a PLC infected state node, and θ 21 (t) represents the probability that a PLC susceptible state node The probability that the susceptible state node is adjacent to the PC infected state node, θ 22 (t) represents the probability that the PLC susceptible state node is adjacent to the PLC infected state node, as follows:

Figure BDA0003769200900000101
Figure BDA0003769200900000101

Figure BDA0003769200900000102
Figure BDA0003769200900000102

Figure BDA0003769200900000103
Figure BDA0003769200900000103

Figure BDA0003769200900000104
Figure BDA0003769200900000104

定义一个PC网络的状态节点的度,用(i,j)表示,即表示为PC网络的某个 状态节点与i个其他PC网络的状态节点及j个PLC网络的状态节点相连接; 一个PLC网络的状态节点的度,用(k,l)表示,即意为PLC网络的某个状态节 点与k个其他PLC网络的状态节点及,l个PC网络的状态节点相连接;同时, 任意时刻满足以下关系:Define the degree of a state node of a PC network, represented by (i, j), that is, a certain state node of the PC network is connected with i state nodes of other PC networks and j state nodes of the PLC network; a PLC The degree of the state node of the network is represented by (k,l), which means that a certain state node of the PLC network is connected with k state nodes of other PLC networks and l state nodes of the PC network; at the same time, at any time Satisfy the following relationship:

Figure BDA0003769200900000105
Figure BDA0003769200900000105

Figure BDA0003769200900000106
Figure BDA0003769200900000106

S3:构建恶意程序传播模型的微分方程组;S3: Differential equations for building a malicious program propagation model;

PC-PLC网络节点状态转换微分方程如下:The PC-PLC network node state transition differential equation is as follows:

Figure BDA0003769200900000107
Figure BDA0003769200900000107

Figure BDA0003769200900000108
Figure BDA0003769200900000108

Figure BDA0003769200900000111
Figure BDA0003769200900000111

Figure BDA0003769200900000112
Figure BDA0003769200900000112

Figure BDA0003769200900000113
Figure BDA0003769200900000113

Figure BDA0003769200900000114
Figure BDA0003769200900000114

Figure BDA0003769200900000115
Figure BDA0003769200900000115

Figure BDA0003769200900000116
分别是在t时刻PC网络度为(i,j)的易感节点(S)、感染节点(I)、隔离节点(Q)、免疫节点(R)的数量,
Figure BDA0003769200900000117
分别是在t时刻PLC网络度为(k,l)的易感节点、感染节点、免疫节点的数量,
Figure BDA0003769200900000118
为PC网络度为(i,j)的各节点总数,
Figure BDA0003769200900000119
为PLC网络度为(k,l)的各节点总数。
Figure BDA0003769200900000116
are the number of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree (i, j) at time t,
Figure BDA0003769200900000117
are the number of susceptible nodes, infected nodes and immune nodes with PLC network degree (k,l) at time t, respectively,
Figure BDA0003769200900000118
is the total number of nodes with PC network degree (i, j),
Figure BDA0003769200900000119
is the total number of nodes with PLC network degree (k,l).

S4:提出控制策略;S4: propose control strategy;

为有效抵御恶意程序的攻击,采用了对感染节点进行查杀并注射免疫补丁、 加大对感染节点移除隔离、对隔离节点进行查杀并注射免疫补丁以及加大新投 放的节点中免疫节点的占比几种措施。In order to effectively resist the attack of malicious programs, it adopts the method of killing infected nodes and injecting immune patches, increasing the removal and isolation of infected nodes, killing isolated nodes and injecting immune patches, and increasing the number of immune nodes among newly launched nodes. The proportion of several measures.

为实现优化目标,利用庞特里亚金极大值原理,选取γ1、γ2、b、δ1、ω1作为优化控制变量,优化控制变量的可行域为U={u=(γ12,b,δ11)|,0≤ γ1≤1,0≤γ2≤1,0≤b≤1,0≤δ1≤1,0≤ω1≤1,t∈[0,tf]},tf表示本次 最优控制的终端时刻。In order to achieve the optimization goal, γ 1 , γ 2 , b, δ 1 , ω 1 are selected as optimization control variables by using the Pontryagin maximum principle, and the feasible region of the optimization control variables is U={u=(γ 12 ,b,δ 11 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ω 1 ≤1,t∈ [0,t f ]}, t f represents the terminal moment of this optimal control.

S5:构建成本代价函数;S5: Build a cost function;

成本代价函数用J(γ12,b,δ11)表示,,通过以下公式确定:The cost function is denoted by J(γ 12 ,b,δ 11 ), and is determined by the following formula:

Figure BDA0003769200900000121
Figure BDA0003769200900000121

其中u1(t)=γ1,u2(t)=γ2,u3(t)=b,u4(t)=δ1,u5(t)=ω1where u 1 (t)=γ 1 , u 2 (t)=γ 2 , u 3 (t)=b, u 4 (t)=δ 1 , u 5 (t)=ω 1 .

S6:构造拉格朗日函数,引入拉格朗日乘子;S6: Construct a Lagrangian function and introduce a Lagrangian multiplier;

构造的拉格朗日函数如下:The constructed Lagrange function is as follows:

Figure BDA0003769200900000122
Figure BDA0003769200900000122

S7:构造哈密顿函数;S7: Construct a Hamiltonian function;

构造的哈密顿函数如下:The constructed Hamiltonian function is as follows:

Figure BDA0003769200900000123
Figure BDA0003769200900000123

Figure RE-GDA0004016178910000131
Figure RE-GDA0004016178910000131

其中,λi(t),(i=1,2,3,4,5,6,7)为最优控制的协态变量。Among them, λ i (t), (i=1, 2, 3, 4, 5, 6, 7) is the optimally controlled co-state variable.

S8:构建协态变量方程组和横截条件;S8: Construct costate variable equations and transversal conditions;

协态方程为:The costate equation is:

Figure BDA0003769200900000132
Figure BDA0003769200900000132

上式中,x1,x2,x3,x4,x5,x4,x7依次对应

Figure BDA0003769200900000133
七个变量。In the above formula, x 1 , x 2 , x 3 , x 4 , x 5 , x 4 , x 7 correspond to
Figure BDA0003769200900000133
seven variables.

构建的横截条件如下:The transversal conditions for the construction are as follows:

λi(tf)=0,i=1,2,3,4,5,6,7。λ i (t f )=0, i=1,2,3,4,5,6,7.

其中,得到优化条件为:Among them, the optimized conditions are:

Figure BDA0003769200900000141
Figure BDA0003769200900000141

即:Right now:

Figure BDA0003769200900000142
Figure BDA0003769200900000142

S9:求解最优控制对;S9: Solve the optimal control pair;

求解答得到系统最终的最优控制对为:Solve the solution to get the final optimal control pair of the system as:

Figure BDA0003769200900000143
Figure BDA0003769200900000143

本发明上述实施例,重点是建立PC-PLC配电网信息物理系统恶意程序传 播模型,该模型充分考虑了目前的现实状况后用来模拟现实中PC-PLC配电网 信息物理系统的无线可充电传感器网络中恶意程序传播的情况的。该模型考虑 了非线性感染率、异构、时滞等因素。本发明针对建立的PC-PLC配电网信息 物理系统恶意程序传播模型进行控制,提供了最优控制方案;构建针对控制恶 意程序的成本代价函数,根据模型的微分方程及成本代价函数构建哈密尔顿方 程,求解协态方程组和最优控制对,实现以最小的代价达到较好的控制效果。The above embodiments of the present invention focus on establishing a malicious program propagation model of the PC-PLC distribution network information physical system, which is used to simulate the wireless communication of the PC-PLC distribution network information physical system after fully considering the current reality The situation of malicious program propagation in charging sensor network. The model takes into account factors such as nonlinear infection rate, heterogeneity, and time lag. The present invention controls the malicious program propagation model of the established PC-PLC distribution network information physical system, and provides an optimal control scheme; constructs a cost function for controlling malicious programs, and constructs the Hamiltonian equation according to the differential equation and the cost function of the model , to solve the co-state equations and the optimal control pair to achieve a better control effect at the minimum cost.

最后应当说明的是,以上实施例仅用以说明本发明的技术方案,而非对本 发明保护范围的限制,尽管参照较佳实施例对本发明作了详细地说明,本领域 的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换, 而不脱离本发明技术方案的实质和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, rather than limiting the protection scope of the present invention, although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand , the technical solution of the present invention may be modified or equivalently replaced without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1.一种基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,包括以下步骤:1. A malicious program control method based on PC-PLC power distribution network information physical system, it is characterized in that, comprising the following steps: S1:基于现实问题分析划分PL、PLC网络节点;S1: Divide PL and PLC network nodes based on analysis of real problems; S2:构建网络节点状态转移图;S2: Build a network node state transition diagram; S3:构建恶意程序传播模型的微分方程组;S3: Differential equations for building a malicious program propagation model; S4:提出控制策略;S4: propose control strategies; S5:构建成本代价函数;S5: Build a cost function; S6:构造拉格朗日函数,引入拉格朗日乘子;S6: Construct a Lagrangian function and introduce a Lagrangian multiplier; S7:构造哈密顿函数;S7: Construct a Hamiltonian function; S8:构建协态变量方程组和横截条件;S8: Construct costate variable equations and transversal conditions; S9:求解最优控制对。S9: Solve the optimal control pair. 2.根据权利要求1所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S1中,将计算机PC网络和可编程控制器PLC网络分别记为A网络以及B网络,A网络和B网络的每一台设备对应一个节点,并根据节点被感染的程度,将其分类为感染节点、易感节点、免疫节点和隔离节点。2. The malicious program control method based on PC-PLC power distribution network cyber-physical system according to claim 1, characterized in that, in the step S1, the computer PC network and the programmable controller PLC network are respectively marked as A network And B network, each device of A network and B network corresponds to a node, and according to the degree of infection of the node, it is classified into infected node, susceptible node, immune node and isolated node. 3.根据权利要求1所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S3中,基于网络节点状态转移图构建微分方程组,具体如下:3. the malicious program control method based on the PC-PLC power distribution network information physical system according to claim 1, is characterized in that, in the described step S3, builds differential equations based on the network node state transition graph, specifically as follows:
Figure FDA0003769200890000011
Figure FDA0003769200890000011
Figure FDA0003769200890000021
Figure FDA0003769200890000021
Figure FDA0003769200890000022
Figure FDA0003769200890000022
Figure FDA0003769200890000023
Figure FDA0003769200890000023
Figure FDA0003769200890000024
Figure FDA0003769200890000024
Figure FDA0003769200890000025
Figure FDA0003769200890000025
Figure FDA0003769200890000026
Figure FDA0003769200890000026
式中,θxy(t)定义为易感节点具有相邻的感染节点的概率,x=1,2;y=1,2,其中“1”代表PC网络,“2”代表PLC网络,即:In the formula, θ xy (t) is defined as the probability that a susceptible node has an adjacent infected node, x=1,2; y=1,2, where "1" represents the PC network, and "2" represents the PLC network, namely : θ11(t)代表PC易感节点与PC感染节点相邻的概率,θ12(t)代表PC易感节点与PLC感染节点相邻的概率,θ21(t)代表PLC易感节点与PC感染节点相邻的概率,θ22(t)代表PLC易感节点与PLC感染节点相邻的概率,具体如下:θ 11 (t) represents the probability that a PC-susceptible node is adjacent to a PC-infected node, θ 12 (t) represents the probability that a PC-susceptible node is adjacent to a PLC-infected node, and θ 21 (t) represents the probability that a PLC-susceptible node is adjacent to a PC The probability that the infected node is adjacent, θ 22 (t) represents the probability that the PLC susceptible node is adjacent to the PLC infected node, as follows:
Figure FDA0003769200890000027
Figure FDA0003769200890000027
Figure FDA0003769200890000028
Figure FDA0003769200890000028
Figure FDA0003769200890000029
Figure FDA0003769200890000029
Figure FDA00037692008900000210
Figure FDA00037692008900000210
Figure FDA00037692008900000211
分别是在t时刻PC网络度为(i,j)的易感节点(S)、感染节点(I)、隔离节点(Q)、免疫节点(R)的数量,
Figure FDA00037692008900000212
分别是在t时刻PLC网络度为(k,l)的易感节点、感染节点、免疫节点的数量,
Figure FDA0003769200890000031
为PC网络度为(i,j)的各节点总数,
Figure FDA0003769200890000032
为PLC网络度为(k,l)的各节点总数;一个PC节点的度,用(i,j)表示,即表示为PC网络的某个节点与i个其他PC节点及j个PLC节点相连接;一个PLC节点的度,用(k,l)表示,即意为PLC网络的某个节点与k个其他PLC节点及,l个PC节点相连接;同时,任意时刻满足以下关系:
Figure FDA00037692008900000211
are the number of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree (i, j) at time t,
Figure FDA00037692008900000212
are the number of susceptible nodes, infected nodes and immune nodes with PLC network degree (k,l) at time t, respectively,
Figure FDA0003769200890000031
is the total number of nodes with PC network degree (i, j),
Figure FDA0003769200890000032
is the total number of nodes in the PLC network whose degree is (k, l); the degree of a PC node is expressed by (i, j), which means that a node in the PC network is related to i other PC nodes and j PLC nodes Connection; the degree of a PLC node is represented by (k,l), which means that a node in the PLC network is connected to k other PLC nodes and l PC nodes; at the same time, the following relationship is satisfied at any time:
Figure FDA0003769200890000033
Figure FDA0003769200890000033
Figure FDA0003769200890000034
Figure FDA0003769200890000034
γ1、γ2分别为PC、PLC网络感染节点病毒查杀率;μ1为PC网络节点出生率及死亡率,μ2为PLC网络节点出生率及死亡率;b为PC网络免疫节点出生占比;1-b为PC网络易感节点出生占比;θ1为PC网络易感节点由PLC网络引起的感染率;θ2为PLC网络易感节点由PC网络引起的感染率;δ1为PC网络感染节点隔离率;ω1为PC网络隔离节点恢复率;η1、η2为PC、PLC网络免疫节点失免率;τ1为PC网络免疫节点失去免疫能力的延时,τ2为PLC网络免疫节点失去免疫能力的延时;β1、β2、β3、β4、c、d、g、h均为正常数。γ 1 and γ 2 are the virus detection and killing rates of PC and PLC network infection nodes respectively; μ 1 is the birth rate and death rate of PC network nodes, and μ 2 is the birth rate and death rate of PLC network nodes; b is the proportion of births of PC network immune nodes; 1-b is the birth ratio of PC network susceptible nodes; θ 1 is the infection rate of PC network susceptible nodes caused by PLC network; θ 2 is the infection rate of PLC network susceptible nodes caused by PC network; δ 1 is the infection rate of PC network Infection node isolation rate; ω 1 is PC network isolation node recovery rate; η 1 , η 2 is PC, PLC network immune node loss rate; τ 1 is the delay of PC network immune node losing immunity, τ 2 is PLC network Delay of immune node losing immunity; β 1 , β 2 , β 3 , β 4 , c, d, g, h are all normal numbers.
4.根据权利要求3所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S4中,控制策略包括对感染节点进行查杀并注射免疫补丁、加大对感染节点移除隔离、对隔离节点进行查杀并注射免疫补丁以及加大新投放的节点中免疫节点的占比;4. The malicious program control method based on PC-PLC power distribution network cyber-physical system according to claim 3, characterized in that, in the step S4, the control strategy includes checking and killing infected nodes and injecting immune patches, increasing Remove and isolate infected nodes, check and kill isolated nodes and inject immune patches, and increase the proportion of immune nodes among newly launched nodes; 选取γ1、γ2、b、δ1、ω1作为优化控制变量,优化控制变量的可行域为U={u=(γ12,b,δ11)|,0≤γ1≤1,0≤γ2≤1,0≤b≤1,0≤δ1≤1,0≤ω1≤1,t∈[0,tf]},tf表示本次最优控制的终端时刻。Select γ 1 , γ 2 , b, δ 1 , and ω 1 as optimal control variables, and the feasible region of optimal control variables is U={u=(γ 12 ,b,δ 11 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ω 1 ≤1,t∈[0,t f ]}, t f represents the optimal control terminal moment. 5.根据权利要求3所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S5中,成本代价函数用J(γ12,b,δ11)表示,通过以下公式确定:5. The malicious program control method based on PC-PLC distribution network cyber-physical system according to claim 3, characterized in that, in the step S5, the cost function is J(γ 1 , γ 2 , b, δ 11 ), which is determined by the following formula:
Figure FDA0003769200890000041
Figure FDA0003769200890000041
其中u1(t)=γ1,u2(t)=γ2,u3(t)=b,u4(t)=δ1,u5(t)=ω1where u 1 (t)=γ 1 , u 2 (t)=γ 2 , u 3 (t)=b, u 4 (t)=δ 1 , u 5 (t)=ω 1 .
6.根据权利要求5所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述S6中,构造的拉格朗日函数如下:6. the malicious program control method based on PC-PLC power distribution network information physical system according to claim 5, is characterized in that, in the described S6, the Lagrangian function of construction is as follows:
Figure FDA0003769200890000042
Figure FDA0003769200890000042
7.根据权利要求5所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S7中,构造的哈密顿函数如下:7. the malicious program control method based on PC-PLC power distribution network information physics system according to claim 5, is characterized in that, in described step S7, the Hamiltonian function of construction is as follows:
Figure RE-FDA0003937455670000043
Figure RE-FDA0003937455670000043
Figure RE-FDA0003937455670000051
Figure RE-FDA0003937455670000051
其中,λi(t),(i=1,2,3,4,5,6,7)为最优控制的协态变量。Wherein, λ i (t), (i=1, 2, 3, 4, 5, 6, 7) is a co-state variable of optimal control.
8.根据权利要求4所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S8中,构建的横截条件如下:8. The malicious program control method based on the PC-PLC power distribution network cyber-physical system according to claim 4, wherein, in the step S8, the transversal conditions of construction are as follows: λi(tf)=0,i=1,2,3,4,5,6,7。λ i (t f )=0, i=1, 2, 3, 4, 5, 6, 7. 9.根据权利要求8所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述步骤S8中,协态方程为:9. The malicious program control method based on PC-PLC power distribution network cyber-physical system according to claim 8, characterized in that, in the step S8, the co-state equation is:
Figure FDA0003769200890000052
Figure FDA0003769200890000052
其中,x1,x2,x3,x4,x5,x4,x7依次对应
Figure FDA0003769200890000053
七个变量。
Among them, x 1 , x 2 , x 3 , x 4 , x 5 , x 4 , x 7 correspond in turn
Figure FDA0003769200890000053
seven variables.
10.根据权利要求7所述的基于PC-PLC配电网信息物理系统恶意程序控制方法,其特征在于,所述S9中,系统最终的最优控制对为:10. The malicious program control method based on the PC-PLC power distribution network cyber-physical system according to claim 7, wherein in the S9, the final optimal control pair of the system is:
Figure FDA0003769200890000061
Figure FDA0003769200890000061
CN202210896796.8A 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC Pending CN115643579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210896796.8A CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210896796.8A CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Publications (1)

Publication Number Publication Date
CN115643579A true CN115643579A (en) 2023-01-24

Family

ID=84939959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210896796.8A Pending CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Country Status (1)

Country Link
CN (1) CN115643579A (en)

Similar Documents

Publication Publication Date Title
CN109145428B (en) A Vulnerability Assessment Method for Cyber-Physical Fusion System under Cascading Failure Mode
CN107682195B (en) Robustness evaluation method of communication network based on the combination of complex network and big data
CN112929205B (en) Swarm unmanned plane fault propagation method based on cellular automaton
CN106656571A (en) Clustering wireless sensor network malicious program propagation model based on evolution game
CN110887173A (en) Method and device for remotely controlling central air-conditioning system
CN104980440B (en) Big data transmission method for active distribution network based on content filtering and multi-agent cooperation
CN108388975A (en) A kind of Information Security Risk transmission control method and device based on Epidemic Model
CN112636357A (en) Power grid vulnerability analysis method based on reinforcement learning
CN113660241A (en) Automatic penetration testing method based on deep reinforcement learning
CN111343180A (en) Multi-type malicious program attack and defense method based on nonlinear rechargeable sensor network model
CN116560240A (en) Computer readable storage medium and second order multi-agent consistency control system
CN115643579A (en) Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC
CN115913704A (en) A time-delay pulse control method for intelligent unmanned swarm system against spoofing attack
CN111224942B (en) Malicious software propagation control method and device based on ternary association diagram detection
CN117792749A (en) Dynamic industrial control honeypot deployment method based on deep reinforcement learning
CN116318828A (en) A kind of industrial Internet virus prevention and control method
CN103051537B (en) IP Circuit Service transmission dispatching method and system
CN114139374B (en) Industrial robot system attack chain modeling method based on Petri network
CN113282881B (en) Electric power information physical system robustness analysis method based on reachable matrix
CN116782423A (en) A method for optimizing information transmission in coal and rock cutting status identification systems
CN116668067A (en) A Distributed Hybrid Network Attack Detection Method for Interconnected Nonlinear Cyber-Physical Systems
CN117171751A (en) Patch optimization restoration method and system for industrial Internet of things malicious program propagation
CN115499153B (en) An optimal control method for power CPS worm virus based on benign worm interaction
CN109858763A (en) A kind of building method and device of the electric power industrial control data message based on GAN
Carpenter Production-optimization strategy using a hybrid genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination