[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115643579A - Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC - Google Patents

Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC Download PDF

Info

Publication number
CN115643579A
CN115643579A CN202210896796.8A CN202210896796A CN115643579A CN 115643579 A CN115643579 A CN 115643579A CN 202210896796 A CN202210896796 A CN 202210896796A CN 115643579 A CN115643579 A CN 115643579A
Authority
CN
China
Prior art keywords
network
node
plc
nodes
susceptible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210896796.8A
Other languages
Chinese (zh)
Inventor
刘贵云
张朝峻
梁忠伟
钟晓静
程乐峰
刘晓初
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou University
Original Assignee
Guangzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou University filed Critical Guangzhou University
Priority to CN202210896796.8A priority Critical patent/CN115643579A/en
Publication of CN115643579A publication Critical patent/CN115643579A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention discloses a power distribution network information physical system malicious program control method based on a PC-PLC, which comprises the following steps: s1: PL and PLC network nodes are divided based on real problem analysis; s2: constructing a network node state transition diagram; s3: constructing a differential equation set of a malicious program propagation model; s4: a control strategy is proposed; s5: constructing a cost function; s6: constructing a Lagrange function, and introducing a Lagrange multiplier; s7: constructing a Hamiltonian; s8: constructing a covariate equation set and a cross-section condition; s9: and solving the optimal control pair. According to the method, the cost function for controlling the malicious program is constructed, the Hamilton equation is constructed according to the differential equation of the model and the cost function, the collaborative equation set and the optimal control pair are solved, and the purpose that a better control effect is achieved with the minimum cost is achieved.

Description

Power distribution network information physical system malicious program control method based on PC-PLC
Technical Field
The invention relates to the technical field of wireless chargeable sensor networks, in particular to a method for controlling malicious programs of a PC-PLC-based power distribution network information physical system, which is used for carrying out propagation modeling and optimal control on malicious programs of a wireless chargeable sensor network of a power system.
Background
In recent years, with the rapid development of wireless chargeable sensor network technology, the application of the wireless chargeable sensor network technology is increasingly common, and the shadow can be seen in the fields of military affairs, agriculture, industry, traffic, information equipment and the like. The power industry is used as the basis of national economic development, the power industry rapidly responds to social power consumption requirements, meanwhile, real-time, safe and flexible information traffic is achieved, reasonable optimization and effective scheduling of resources are achieved, a traditional power grid cannot meet the requirements of power development, and a modern power system is developed into a power information physical system with deep integration of the power grid and the information grid.
A modern electric power information physical system is coupled with an information layer on the basis of a traditional electric power network physical layer, and mutual communication is carried out through a large number of sensor connections so as to realize real-time sensing, detection and processing of information in a target area. However, the power grid enjoys the benefits of the physical system of power information, which makes modern power grids more economical and efficient to operate, and also bears the potential risks of safety aspects caused by intelligent interconnection to the operation of the power system. In terms of modern power information physical systems, network attacks of malicious programs can be possibly suffered in each link of power generation, power transmission, power distribution and power utilization, the usability, integrity, confidentiality and the like of the system are damaged in different degrees, and even the whole power grid is broken down seriously. Therefore, the security issues of modern power networks cannot be ignored.
The method is an important topic at present, based on potential information security threats of modern power networks, fully considering malicious program propagation and infection mechanisms, and establishing a practical network model to analyze and research an optimal control strategy to inhibit malicious program propagation and guarantee network information security.
Disclosure of Invention
In order to prevent and deal with adverse effects of malicious programs on information of the power information physical system, the invention provides a PC-PLC power distribution network information physical system malicious program transmission model based on a nonlinear time-lag heterogeneous model, so as to solve the problems.
The invention provides the following technical scheme:
a power distribution network information physical system malicious program control method based on a PC-PLC comprises the following steps:
s1: PL and PLC network nodes are divided based on the analysis of the real problems;
s2: constructing a network node state transition diagram;
s3: constructing a differential equation set of a malicious program propagation model;
s4: a control strategy is proposed;
s5: constructing a cost function;
s6: constructing a Lagrangian function, and introducing a Lagrangian multiplier;
s7: constructing a Hamiltonian;
s8: constructing a covariate equation set and a cross-section condition;
s9: and solving the optimal control pair.
Preferably, in step S1, the PC network and the PLC network are respectively denoted as a network a and a network B, each device of the network a and the network B corresponds to a node, and the nodes are classified into an infected node, a susceptible node, an immune node, and an isolated node according to the degree of infection of the node. Preferably, in S2, the most important k words are selected from all the texts x in T, including the confrontation sample and the clean sample, and are sorted, and are denoted as C (x).
Preferably, in step S3, a system of differential equations is constructed based on the state transition diagram of the network node, specifically as follows:
Figure BDA0003769200900000031
Figure BDA0003769200900000032
Figure BDA0003769200900000033
Figure BDA0003769200900000034
Figure BDA0003769200900000035
Figure BDA0003769200900000036
Figure BDA0003769200900000037
in the formula, theta xy (t) is defined as the probability that a susceptible node has a neighboring infected node, x =1,2; y =1,2, wherein "1" represents a PC network and "2" represents a PLC network, i.e.:
θ 11 (t) represents the probability that a PC susceptible node is adjacent to a PC infected node, θ 12 (t) represents the probability of a PC susceptible node being adjacent to a PLC infected node, θ 21 (t) represents the probability that a PLC-susceptible node is adjacent to a PC-infected node, θ 22 (t) represents the probability that the PLC susceptible node is adjacent to the PLC infected node, and the probability is as follows:
Figure BDA0003769200900000038
Figure BDA0003769200900000039
Figure BDA0003769200900000041
Figure BDA0003769200900000042
Figure BDA0003769200900000043
respectively the numbers of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with the PC network degree of (I, j) at the time t,
Figure BDA0003769200900000044
respectively the number of susceptible nodes, infected nodes and immune nodes with PLC network degree of (k, l) at the time t,
Figure BDA0003769200900000045
the total number of each node with the PC network degree of (i, j),
Figure BDA0003769200900000046
the total number of each node with the PLC network degree of (k, l); 1. the degree of each PC node is represented by (i, j), namely, a certain node of the PC network is connected with i other PC nodes and j PLC nodes; the degree of one PLC node is represented by (k, l), namely that a certain node of the PLC network is connected with k other PLC nodes and l PC nodes; at the same time, the following relationships are satisfied at any time:
Figure BDA0003769200900000047
Figure BDA0003769200900000048
γ 1 、γ 2 are respectively provided withVirus killing rate of infected nodes of PC and PLC networks; mu.s 1 Is the birth rate and death rate of PC network nodes, mu 2 The birth rate and the death rate of the PLC network nodes; b is the birth ratio of the immune nodes of the PC network; 1-b is the birth proportion of susceptible nodes of the PC network; theta.theta. 1 Infection rate caused by a PLC network for the PC network susceptible nodes; theta.theta. 2 The infection rate of the susceptible nodes of the PLC network caused by the PC network; delta. For the preparation of a coating 1 Infecting the node isolation rate for the PC network; omega 1 Isolating the node recovery rate for the PC network; eta 1 、η 2 The node failure immunity rate of the PC and PLC network; tau. 1 Time delay, tau, for loss of immunity of PC network immune node 2 Delaying the immunity losing capability of the PLC network immunity node; beta is a beta 1 、β 2 、β 3 、β 4 C, d, g and h are normal numbers.
Preferably, in the step S4, the control strategy includes searching and killing the infected node and injecting an immune patch, increasing the removal of isolation of the infected node, searching and killing the isolated node and injecting an immune patch, and increasing the proportion of immune nodes in newly released nodes;
selecting gamma 1 、γ 2 、b、δ 1 、ω 1 As the optimization control variable, the feasible domain of the optimization control variable is U = { U = (γ) 12 ,b,δ 11 )|,0≤γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ ω 1 ≤1,t∈[0,t f ]},t f And the terminal time of the optimal control is shown.
Preferably, in the step S5, the cost function is J (γ) 12 ,b,δ 11 ) Expressed, determined by the following equation:
Figure BDA0003769200900000051
wherein u 1 (t)=γ 1 ,u 2 (t)=γ 2 ,u 3 (t)=b,u 4 (t)=δ 1 ,u 5 (t)=ω 1
Preferably, in S6, the lagrangian function is constructed as follows:
Figure BDA0003769200900000052
preferably, in S7, the hamiltonian is constructed as follows:
Figure BDA0003769200900000053
Figure RE-GDA0004016178910000061
wherein λ is i (t), (i =1,2,3,4,5,6, 7) are covariates for optimal control.
Preferably, in step S8, the cross-section conditions are as follows:
λ i (t f )=0,i=1,2,3,4,5,6,7。
preferably, in S8, the collaborative equation is:
Figure BDA0003769200900000062
wherein x is 1 ,x 2 ,x 3 ,x 4 ,x 5 ,x 4 ,x 7 Correspond to each other in sequence
Figure BDA0003769200900000063
Seven variables.
Preferably, in S9, the final optimal control pair of the system is:
Figure BDA0003769200900000064
the invention has the beneficial effects that:
the invention fully considers the situation of malicious program propagation in a wireless chargeable sensor network used for simulating a PC-PLC power distribution network information physical system in reality after the current practical situation: the nonlinear infection rate is considered, the capability of a malicious program for infecting the sensor node is not fixed, and the bilinear occurrence rate and the standard occurrence rate which are supposed in early research are extreme ideal conditions; in consideration of isomerism, rechargeable sensors used in the existing power grid are often heterogeneous, and the heterogeneous rechargeable sensors are widely applied to complex scenes due to good network stability, reliability and survivability; considering time lag, the sensor immune node cannot be lost at once due to infection of a malicious program in reality, and the time delay is different for different networks. The method is characterized in that control is performed aiming at the established PC-PLC distribution network information physical system malicious program propagation model, and an optimal control scheme is provided: and a cost function for controlling the malicious program is constructed, a Hamilton equation is constructed according to a differential equation of the model and the cost function, a collaborative equation set and a best control pair are solved, and a good control effect is achieved with the minimum cost.
Drawings
The invention is further described with the aid of the accompanying drawings, in which the embodiments do not constitute any limitation of the invention, and for a person skilled in the art, without inventive effort, further drawings may be derived from the following figures.
FIG. 1 is a flow chart of a method for controlling malicious programs of a PC-PLC-based power distribution network information physical system;
FIG. 2 is a state transition diagram of a PC/PLC wireless chargeable sensor network according to the present invention.
Detailed Description
The method for controlling malicious programs based on the cyber-PLC power distribution cyber-physical system is further described in detail with reference to specific embodiments, which are only used for comparison and explanation purposes, and the present invention is not limited to these embodiments.
Examples
In order to prevent and deal with adverse effects of malicious programs on information of the power information physical system, the PC-PLC power distribution network information physical system malicious program propagation model based on the nonlinear time lag heterogeneous model and the corresponding optimal control method are provided.
As shown in fig. 1, the method for controlling the malicious program of the PC-PLC-based power distribution network cyber-physical system includes the following steps:
s1: PL and PLC network nodes are divided based on the analysis of the real problems;
a PC-PLC power distribution network information physical system malicious program propagation model is established, a computer network (PC network) and a programmable controller network (PLC network) are recorded as an A network and a B network, each device of the A network and the B network corresponds to a node, and the nodes are classified into infected nodes, susceptible nodes, immune nodes and isolated nodes according to the degree of infection of the nodes.
S2: constructing a network node state transition diagram;
a state transition diagram of the PC and PLC wireless chargeable sensor network shown in fig. 2 is constructed, and it is assumed that the PC network (a) includes a susceptible state node (S), an infected state node (I), an isolated state node (Q), and an immune state node (R), and the PLC network (B) includes a susceptible state node (S), an infected state node (I), and an immune state node (R), and the total number of network nodes is N. Suppose the status node occurrence rate of the PC network is mu 1 The new born state nodes comprise susceptible state nodes and immune state nodes, wherein the susceptible state node proportion is 1-b, and the immune state node proportion is b; the state node birth rate of the PLC network is mu 2 And all the new born nodes are susceptible state nodes.
Definition of gamma 1 、γ 2 Respectively the virus killing rates of the nodes in the PC and PLC network infection states; mu.s 1 Is the node birth rate and death rate of the PC network state, mu 2 The birth rate and the death rate of the nodes in the PLC network state are calculated; b is the birth proportion of the immune state node of the PC network; 1-b is the birth proportion of the nodes in the PC network susceptibility state; theta.theta. 1 Infection rate caused by a PLC network for a PC network susceptible state node; theta 2 For PLC networksThe node is susceptible to infection caused by the PC network; delta. For the preparation of a coating 1 The node isolation rate is the PC network infection state; omega 1 Isolating the state node recovery rate for the PC network; eta 1 、η 2 The node immunization failure rate of the PC and PLC network; tau is 1 Time delay of losing immunity ability for PC network immunity state node 2 The time delay of losing the immunity capability of the node in the immunity state of the PLC network is delayed; beta is a 1 、β 2 、β 3 、β 4 C, d, g and h are normal numbers.
For the susceptible nodes of the PC network, new nodes are invested, part of the susceptible nodes of the PC network can be infected by the infected nodes of the PC network to become infected nodes, part of the susceptible nodes of the PLC network can be infected by the infected nodes of the PC network to become infected nodes, and part of the susceptible nodes of the PLC network can be removed due to death. For the PC network infected state node, a part may be isolated, a part may be changed into an immune state node by virus killing, patching and other measures, and a part may be removed due to death. For the PC network quarantine node, part of the node is recovered by treatment to become an immune state node, and part of the node is removed by death. For the PC network immune state node, a new node is introduced, part of the node may lose the immune ability and become susceptible state nodes, and part of the node may be removed due to death.
For the susceptible nodes of the PLC network, new nodes are input, part of the susceptible nodes of the PLC network can be infected by the infected nodes of the PLC network to become infected nodes, part of the susceptible nodes of the PC network can be infected by the infected nodes of the PC network to become infected nodes, and part of the susceptible nodes of the PC network can be removed due to death. For a PLC network infected node, part of the node can be changed into an immune state node through virus killing, patching and other measures, and part of the node can be removed due to death. For PLC network immune status nodes, part of the immune status nodes may become immune-competent status nodes, and part may be removed by death.
Definition of theta xy (t) is the probability of a susceptible node having a neighboring infection status node, x =1,2; y =1,2, wherein "1" represents a PC network and "2" represents a PLC network, i.e.:
θ 11 (t) represents the probability that a PC susceptible state node is adjacent to a PC infected state node, θ 12 (t) represents the probability that the PC susceptibility state node is adjacent to the PLC infection state node, θ 21 (t) represents the probability that a PLC susceptibility status node is adjacent to a PC infection status node, θ 22 (t) represents the probability that the PLC susceptible state node is adjacent to the PLC infected state node, and the probability is as follows:
Figure BDA0003769200900000101
Figure BDA0003769200900000102
Figure BDA0003769200900000103
Figure BDA0003769200900000104
defining the degree of the state nodes of one PC network, and expressing the degree by (i, j), namely, expressing that a certain state node of the PC network is connected with the state nodes of i other PC networks and the state nodes of j PLC networks; the degree of the state nodes of one PLC network is expressed by (k, l), namely that a certain state node of the PLC network is connected with the state nodes of k other PLC networks and the state nodes of l PC networks; meanwhile, the following relationship is satisfied at any time:
Figure BDA0003769200900000105
Figure BDA0003769200900000106
s3: constructing a differential equation set of a malicious program propagation model;
the state conversion differential equation of the PC-PLC network node is as follows:
Figure BDA0003769200900000107
Figure BDA0003769200900000108
Figure BDA0003769200900000111
Figure BDA0003769200900000112
Figure BDA0003769200900000113
Figure BDA0003769200900000114
Figure BDA0003769200900000115
Figure BDA0003769200900000116
respectively the numbers of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree of (I, j) at the time t,
Figure BDA0003769200900000117
the numbers of susceptible nodes, infected nodes and immune nodes with PLC network degree of (k, l) at the time t respectively,
Figure BDA0003769200900000118
the total number of each node with the PC network degree of (i, j),
Figure BDA0003769200900000119
the total number of each node with the PLC network degree of (k, l) is obtained.
S4: a control strategy is proposed;
in order to effectively resist the attack of malicious programs, the method adopts several measures of killing infected nodes and injecting immune patches, increasing the removal of isolation of the infected nodes, killing isolated nodes and injecting immune patches and increasing the proportion of immune nodes in newly released nodes.
In order to realize the optimization target, the maximum value principle of Pontryagin is utilized to select gamma 1 、γ 2 、b、δ 1 、ω 1 As the optimization control variable, the feasible domain of the optimization control variable is U = { U = (γ) 12 ,b,δ 11 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ω 1 ≤1,t∈[0,t f ]},t f And the terminal time of the optimal control is shown.
S5: constructing a cost function;
cost function is represented by J (gamma) 12 ,b,δ 11 ) Expressed, determined by the following equation:
Figure BDA0003769200900000121
wherein u 1 (t)=γ 1 ,u 2 (t)=γ 2 ,u 3 (t)=b,u 4 (t)=δ 1 ,u 5 (t)=ω 1
S6: constructing a Lagrange function, and introducing a Lagrange multiplier;
the lagrangian function is constructed as follows:
Figure BDA0003769200900000122
s7: constructing a Hamiltonian;
the hamiltonian is constructed as follows:
Figure BDA0003769200900000123
Figure RE-GDA0004016178910000131
wherein λ is i (t), (i =1,2,3,4,5,6, 7) are covariates for optimal control.
S8: constructing a covariate equation set and a cross-section condition;
the cooperative equation is:
Figure BDA0003769200900000132
in the above formula, x 1 ,x 2 ,x 3 ,x 4 ,x 5 ,x 4 ,x 7 Correspond to each other in sequence
Figure BDA0003769200900000133
Seven variables.
The cross-sectional conditions were constructed as follows:
λ i (t f )=0,i=1,2,3,4,5,6,7。
wherein, the obtained optimized conditions are as follows:
Figure BDA0003769200900000141
namely:
Figure BDA0003769200900000142
s9: solving an optimal control pair;
the solution is solved to obtain the final optimal control pair of the system as follows:
Figure BDA0003769200900000143
the embodiment of the invention is mainly used for establishing a malicious program propagation model of the PC-PLC power distribution network information physical system, and the model fully considers the current practical situation and is used for simulating the propagation condition of the malicious program in the wireless chargeable sensor network of the PC-PLC power distribution network information physical system. The model considers factors such as nonlinear infection rate, isomerism, time lag and the like. The method is used for controlling the established PC-PLC power distribution network information physical system malicious program propagation model, and an optimal control scheme is provided; and a cost function aiming at a control malicious program is constructed, a Hamiltonian equation is constructed according to a differential equation of the model and the cost function, a collaborative equation set and an optimal control pair are solved, and a better control effect is achieved with the minimum cost.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for controlling malicious programs of a power distribution network information physical system based on a PC-PLC is characterized by comprising the following steps:
s1: PL and PLC network nodes are divided based on the analysis of the real problems;
s2: constructing a network node state transition diagram;
s3: constructing a differential equation set of a malicious program propagation model;
s4: a control strategy is proposed;
s5: constructing a cost function;
s6: constructing a Lagrangian function, and introducing a Lagrangian multiplier;
s7: constructing a Hamiltonian;
s8: constructing a covariate equation set and a cross-section condition;
s9: and solving the optimal control pair.
2. The method for controlling the malicious programs of the PC-PLC-based power distribution network information physical system according to claim 1, wherein in the step S1, the computer PC network and the PLC network are recorded as an A network and a B network respectively, each device of the A network and the B network corresponds to a node, and the nodes are classified into an infected node, a susceptible node, an immune node and an isolated node according to the degree of infection of the nodes.
3. The PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 1, wherein in the step S3, a system of differential equations is constructed based on a network node state transition diagram, specifically as follows:
Figure FDA0003769200890000011
Figure FDA0003769200890000021
Figure FDA0003769200890000022
Figure FDA0003769200890000023
Figure FDA0003769200890000024
Figure FDA0003769200890000025
Figure FDA0003769200890000026
in the formula, theta xy (t) is defined as the probability that a susceptible node has a neighboring infected node, x =1,2; y =1,2, where "1" represents a PC network and "2" represents a PLC network, i.e.:
θ 11 (t) represents the probability that a PC susceptible node is adjacent to a PC infected node, θ 12 (t) represents the probability that a PC susceptible node is adjacent to a PLC infected node, θ 21 (t) represents the probability that a PLC-susceptible node is adjacent to a PC-infected node, θ 22 (t) represents the probability of the PLC susceptible node being adjacent to the PLC infected node, and the probability is as follows:
Figure FDA0003769200890000027
Figure FDA0003769200890000028
Figure FDA0003769200890000029
Figure FDA00037692008900000210
Figure FDA00037692008900000211
respectively the numbers of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with the PC network degree of (I, j) at the time t,
Figure FDA00037692008900000212
respectively the number of susceptible nodes, infected nodes and immune nodes with PLC network degree of (k, l) at the time t,
Figure FDA0003769200890000031
the total number of each node with the PC network degree of (i, j),
Figure FDA0003769200890000032
the total number of each node with PLC network degree of (k, l); the degree of a PC node is represented by (i, j), namely a certain node of the PC network is connected with i other PC nodes and j PLC nodes; the degree of one PLC node is represented by (k, l), namely that a certain node of the PLC network is connected with k other PLC nodes and l PC nodes; meanwhile, the following relationship is satisfied at any time:
Figure FDA0003769200890000033
Figure FDA0003769200890000034
γ 1 、γ 2 respectively the virus killing rates of the PC network infection node and the PLC network infection node; mu.s 1 Is the birth rate and death rate of PC network nodes, mu 2 Birth rate and death rate of PLC network nodes; b is the birth proportion of the immune nodes of the PC network; 1-b is the birth proportion of susceptible nodes of the PC network; theta 1 Infection rate caused by a PLC network for the PC network susceptible nodes; theta 2 The infection rate of the susceptible nodes of the PLC network caused by the PC network; delta 1 Infecting the node isolation rate for the PC network; omega 1 Isolating the node recovery rate for the PC network; eta 1 、η 2 The immunization node immunization rate of the PC and PLC networks is obtained; tau is 1 Time delay, tau, for loss of immunity of PC network immune node 2 The time delay of losing the immunity of the immunity node of the PLC network is delayed;β 1 、β 2 、β 3 、β 4 all of c, d, g and h are normal numbers.
4. The PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 3, wherein in the step S4, the control strategy includes killing infected nodes and injecting immune patches, increasing removal of isolation of infected nodes, killing isolated nodes and injecting immune patches, and increasing the proportion of immune nodes in newly released nodes;
selecting gamma 1 、γ 2 、b、δ 1 、ω 1 As the optimization control variable, the feasible domain of the optimization control variable is U = { U = (γ) 12 ,b,δ 11 )|,0≤γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ω 1 ≤1,t∈[0,t f ]},t f And the terminal time of the optimal control is shown.
5. The method for controlling the cyber physical system malicious programs on the power distribution network according to the PC-PLC of claim 3, wherein the cost function is J (gamma) in the step S5 12 ,b,δ 11 ) Expressed, determined by the following formula:
Figure FDA0003769200890000041
wherein u is 1 (t)=γ 1 ,u 2 (t)=γ 2 ,u 3 (t)=b,u 4 (t)=δ 1 ,u 5 (t)=ω 1
6. The PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 5, wherein in S6, a Lagrangian function is constructed as follows:
Figure FDA0003769200890000042
7. the method for controlling the malicious programs of the cyber physical system of the power distribution network according to claim 5, wherein in the step S7, a Hamiltonian is constructed as follows:
Figure RE-FDA0003937455670000043
Figure RE-FDA0003937455670000051
wherein λ is i (t), (i =1,2,3,4,5,6,7) is a covariate variable for optimal control.
8. The PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 4, wherein in the step S8, cross-section conditions are constructed as follows:
λ i (t f )=0,i=1,2,3,4,5,6,7。
9. the PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 8, wherein in the step S8, a collaborative equation is:
Figure FDA0003769200890000052
wherein x is 1 ,x 2 ,x 3 ,x 4 ,x 5 ,x 4 ,x 7 Correspond to each other in sequence
Figure FDA0003769200890000053
Seven variables.
10. The PC-PLC-based power distribution network cyber-physical system malicious program control method according to claim 7, wherein in S9, a final optimal control pair of the system is as follows:
Figure FDA0003769200890000061
CN202210896796.8A 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC Pending CN115643579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210896796.8A CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210896796.8A CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Publications (1)

Publication Number Publication Date
CN115643579A true CN115643579A (en) 2023-01-24

Family

ID=84939959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210896796.8A Pending CN115643579A (en) 2022-07-28 2022-07-28 Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC

Country Status (1)

Country Link
CN (1) CN115643579A (en)

Similar Documents

Publication Publication Date Title
Ding et al. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
CN105467839B (en) A kind of multi-agent system under hostile environments convergent control method safely
CN112636357B (en) Power grid vulnerability analysis method based on reinforcement learning
WO2021180017A1 (en) Data service-oriented adaptive intrusion response game method and system thereof
CN112633649A (en) Power grid multi-attribute important node evaluation and planning method
WO2021227465A1 (en) Security defense method and system for industrial control system network
CN110830287A (en) Internet of things environment situation sensing method based on machine learning
Liu et al. Edge-based decentralized adaptive pinning synchronization of complex networks under link attacks
Liu et al. Observer-based synchronization control for complex networks against asynchronous attacks
Wang et al. Impulsive consensus of leader-following nonlinear multi-agent systems under DoS attacks
CN114326403A (en) Multi-agent system security convergence control method based on node information privacy protection
Liang et al. Dual-event-triggered intelligence security control for multiagent systems against DoS attacks with applications in mobile robot systems
Liu et al. Attack‐Defense Game between Malicious Programs and Energy‐Harvesting Wireless Sensor Networks Based on Epidemic Modeling
Choukri et al. Abnormal network traffic detection using deep learning models in iot environment
CN115643579A (en) Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC
Liu et al. Secure synchronization against link attacks in complex networks with event-triggered coupling
CN117891168A (en) Multi-agent system graph reconstruction and weight balance control method
Li et al. A secure routing mechanism for industrial wireless networks based on SDN
CN116340593A (en) Complex network high-order structure importance degree identification method
Shi et al. Flocking control for Cucker–Smale model under denial‐of‐service attacks
CN109617874A (en) A kind of heterogeneous Sensor Network rogue program propagation modeling method
CN112491801B (en) Incidence matrix-based object-oriented network attack modeling method and device
Jiang et al. Dynamic behavior of the interaction between epidemics and cascades on heterogeneous networks
CN115499153B (en) Optimal control method for electric CPS worm viruses based on benign worm interaction
CN108667833B (en) Communication system malicious software propagation modeling and optimal control method based on coupling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination