CN115643579A - Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC - Google Patents
Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC Download PDFInfo
- Publication number
- CN115643579A CN115643579A CN202210896796.8A CN202210896796A CN115643579A CN 115643579 A CN115643579 A CN 115643579A CN 202210896796 A CN202210896796 A CN 202210896796A CN 115643579 A CN115643579 A CN 115643579A
- Authority
- CN
- China
- Prior art keywords
- network
- nodes
- plc
- node
- susceptible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 108010073128 phosphatidylcholine-specific phospholipase C Proteins 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000007704 transition Effects 0.000 claims abstract description 9
- 238000011217 control strategy Methods 0.000 claims abstract description 7
- 238000010586 diagram Methods 0.000 claims abstract description 7
- 208000015181 infectious disease Diseases 0.000 claims description 26
- 230000036039 immunity Effects 0.000 claims description 9
- 238000002955 isolation Methods 0.000 claims description 9
- 241000700605 Viruses Species 0.000 claims description 5
- 238000010276 construction Methods 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 3
- 238000011084 recovery Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 16
- 238000005457 optimization Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000002411 adverse Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及无线可充电传感器网络技术领域,特别涉及一种基于PC-PLC 配电网信息物理系统恶意程序控制方法,进行对电力系统的无线充电传感器网 络恶意程序传播建模及最优控制。The present invention relates to the technical field of wireless rechargeable sensor networks, in particular to a method for controlling malicious programs in a cyber-physical system of a PC-PLC power distribution network for modeling and optimal control of malicious program propagation in a wireless charging sensor network of a power system.
背景技术Background technique
近年来,随着无线可充电传感器网络技术的迅速发展,其应用也日益普遍, 军事、农业、工业、交通、信息设备等领域都可见其身影。电力行业作为国民 经济发展的基础,为快速响应社会用电需求,同时做到实时安全灵活的信息交 流,实现资源的合理优化与有效调度,传统的电力网已经不能满足电力发展的 需要,现代电力系统已发展成为电力网与信息网深度融合的电力信息物理系统。In recent years, with the rapid development of wireless rechargeable sensor network technology, its application is becoming more and more common, and it can be seen in military, agriculture, industry, transportation, information equipment and other fields. As the foundation of national economic development, the power industry, in order to quickly respond to social electricity demand, achieve real-time safe and flexible information exchange, and realize reasonable optimization and effective scheduling of resources. The traditional power grid can no longer meet the needs of power development. The modern power system It has developed into a power cyber-physical system with deep integration of power grid and information network.
现代电力信息物理系统,在传统电力网物理层的基础上,耦合了信息层, 通过大量的传感器连接进行相互通信以实现对其目标区域内信息的实时感知、 检测、处理。然而,电网在享受电力信息物理系统带来的好处——使现代电网 运行更加经济高效的同时,也需要承担智能互联给电力系统运行带来的安全方 面潜在的风险。就现代电力信息物理系统而言,在发电、输电、配电及用电的 各个环节均可能遭到恶意程序的网络攻击,系统的可用性、完整性、保密性等 将遭到不同程度的破坏,严重的甚至会造成整个电力网瘫痪。因此,现代电力 网络的安全问题不容忽视。The modern power cyber-physical system, on the basis of the physical layer of the traditional power network, couples the information layer, and communicates with each other through a large number of sensor connections to achieve real-time perception, detection, and processing of information in its target area. However, while the power grid enjoys the benefits brought by the power cyber-physical system—making the operation of the modern power grid more cost-effective and efficient—it also needs to bear the potential security risks brought by intelligent interconnection to the power system operation. As far as the modern power cyber-physical system is concerned, all aspects of power generation, power transmission, power distribution, and power consumption may be attacked by malicious programs, and the availability, integrity, and confidentiality of the system will be damaged to varying degrees. Severe cases may even cause the entire power grid to be paralyzed. Therefore, the security issues of modern power networks cannot be ignored.
立足现代电力网潜在的信息安全威胁,充分考虑恶意程序传播、感染机制, 建立出切合实际的网络模型以分析研究出最优控制策略来抑制恶意程序传播、 保障网络信息的安全性是当今一个重要的课题。Based on the potential information security threats of modern power grids, fully considering the spread and infection mechanism of malicious programs, establishing a realistic network model to analyze and research the optimal control strategy to suppress the spread of malicious programs and ensure the security of network information is an important task today. topic.
发明内容Contents of the invention
为预防及应对恶意程序对电力信息物理系统信息造成的不良影响,本发明 提供一种基于非线性时滞异构模型的PC-PLC配电网信息物理系统恶意程序传 播模型,以解决上述问题。In order to prevent and deal with the adverse effects of malicious programs on the information of electric power cyber-physical systems, the present invention provides a PC-PLC power distribution network cyber-physical system malicious program propagation model based on nonlinear time-delay heterogeneous model to solve the above problems.
本发明提供如下的技术方案:The present invention provides following technical scheme:
一种基于PC-PLC配电网信息物理系统恶意程序控制方法,包括以下步骤:A malicious program control method based on a PC-PLC power distribution network cyber-physical system, comprising the following steps:
S1:基于现实问题分析划分PL、PLC网络节点;S1: Divide PL and PLC network nodes based on analysis of real problems;
S2:构建网络节点状态转移图;S2: Build a network node state transition diagram;
S3:构建恶意程序传播模型的微分方程组;S3: Differential equations for building a malicious program propagation model;
S4:提出控制策略;S4: propose control strategy;
S5:构建成本代价函数;S5: Build a cost function;
S6:构造拉格朗日函数,引入拉格朗日乘子;S6: Construct a Lagrangian function and introduce a Lagrangian multiplier;
S7:构造哈密顿函数;S7: Construct a Hamiltonian function;
S8:构建协态变量方程组和横截条件;S8: Construct costate variable equations and transversal conditions;
S9:求解最优控制对。S9: Solve the optimal control pair.
优选的,所述步骤S1中,将计算机PC网络和可编程控制器PLC网络分 别记为A网络以及B网络,A网络和B网络的每一台设备对应一个节点,并根 据节点被感染的程度,将其分类为感染节点、易感节点、免疫节点和隔离节点。 优选的,所述S2中,从T中的所有文本x中,包括对抗样本和干净样本,选取 最重要的k个单词,并对其进行排序,记为C(x)。Preferably, in the step S1, the computer PC network and the programmable controller PLC network are recorded as the A network and the B network respectively, and each device of the A network and the B network corresponds to a node, and according to the degree of infection of the node , classifying them as infected nodes, susceptible nodes, immune nodes and isolated nodes. Preferably, in said S2, from all texts x in T, including adversarial samples and clean samples, select the most important k words, and sort them, denoted as C(x).
优选的,所述步骤S3中,基于网络节点状态转移图构建微分方程组,具 体如下:Preferably, in the step S3, the system of differential equations is constructed based on the network node state transition diagram, specifically as follows:
式中,θxy(t)定义为易感节点具有相邻的感染节点的概率,x=1,2;y=1,2, 其中“1”代表PC网络,“2”代表PLC网络,即:In the formula, θ xy (t) is defined as the probability that a susceptible node has an adjacent infected node, x=1,2; y=1,2, where "1" represents the PC network, and "2" represents the PLC network, namely :
θ11(t)代表PC易感节点与PC感染节点相邻的概率,θ12(t)代表PC易感节 点与PLC感染节点相邻的概率,θ21(t)代表PLC易感节点与PC感染节点相邻 的概率,θ22(t)代表PLC易感节点与PLC感染节点相邻的概率,具体如下:θ 11 (t) represents the probability that a PC-susceptible node is adjacent to a PC-infected node, θ 12 (t) represents the probability that a PC-susceptible node is adjacent to a PLC-infected node, and θ 21 (t) represents the probability that a PLC-susceptible node is adjacent to a PC The probability that the infected node is adjacent, θ 22 (t) represents the probability that the PLC susceptible node is adjacent to the PLC infected node, as follows:
分别是在t时刻PC网络度为(i,j)的易感节点(S)、感染节点(I)、隔离节点(Q)、免疫节点(R)的数量,分别是在t时刻PLC网络度为(k,l)的易感节点、感染节点、免疫节点的数量,为PC网络度为(i,j)的各节点总数,为PLC网络度为(k,l)的各节点总数;一 个PC节点的度,用(i,j)表示,即表示为PC网络的某个节点与i个其他PC节点 及j个PLC节点相连接;一个PLC节点的度,用(k,l)表示,即意为PLC网络的 某个节点与k个其他PLC节点及,l个PC节点相连接;同时,任意时刻满足以 下关系: are the number of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree (i, j) at time t, are the number of susceptible nodes, infected nodes and immune nodes with PLC network degree (k,l) at time t, respectively, is the total number of nodes with PC network degree (i, j), is the total number of nodes in the PLC network whose degree is (k, l); the degree of a PC node is expressed by (i, j), which means that a node in the PC network is related to i other PC nodes and j PLC nodes Connection; the degree of a PLC node is represented by (k,l), which means that a node in the PLC network is connected to k other PLC nodes and l PC nodes; at the same time, the following relationship is satisfied at any time:
γ1、γ2分别为PC、PLC网络感染节点病毒查杀率;μ1为PC网络节点出生 率及死亡率,μ2为PLC网络节点出生率及死亡率;b为PC网络免疫节点出生 占比;1-b为PC网络易感节点出生占比;θ1为PC网络易感节点由PLC网络 引起的感染率;θ2为PLC网络易感节点由PC网络引起的感染率;δ1为PC网 络感染节点隔离率;ω1为PC网络隔离节点恢复率;η1、η2为PC、PLC网络免 疫节点失免率;τ1为PC网络免疫节点失去免疫能力的延时,τ2为PLC网络免 疫节点失去免疫能力的延时;β1、β2、β3、β4、c、d、g、h均为正常数。γ 1 and γ 2 are the virus detection and killing rates of PC and PLC network infection nodes respectively; μ 1 is the birth rate and death rate of PC network nodes, and μ 2 is the birth rate and death rate of PLC network nodes; b is the proportion of births of PC network immune nodes; 1-b is the birth ratio of PC network susceptible nodes; θ 1 is the infection rate of PC network susceptible nodes caused by PLC network; θ 2 is the infection rate of PLC network susceptible nodes caused by PC network; δ 1 is the infection rate of PC network Infection node isolation rate; ω 1 is PC network isolation node recovery rate; η 1 , η 2 is PC, PLC network immune node loss rate; τ 1 is the delay of PC network immune node losing immunity, τ 2 is PLC network Delay of immune node losing immunity; β 1 , β 2 , β 3 , β 4 , c, d, g, h are all normal numbers.
更优的,所述步骤S4中,控制策略包括对感染节点进行查杀并注射免疫 补丁、加大对感染节点移除隔离、对隔离节点进行查杀并注射免疫补丁以及加 大新投放的节点中免疫节点的占比;More preferably, in the step S4, the control strategy includes killing infected nodes and injecting immune patches, increasing the removal and isolation of infected nodes, killing isolated nodes and injecting immune patches, and increasing the number of newly launched nodes The proportion of immune nodes in the middle;
选取γ1、γ2、b、δ1、ω1作为优化控制变量,优化控制变量的可行域为 U={u=(γ1,γ2,b,δ1,ω1)|,0≤γ1≤1,0≤γ2≤1,0≤b≤1,0≤δ1≤1,0≤ ω1≤1,t∈[0,tf]},tf表示本次最优控制的终端时刻。Select γ 1 , γ 2 , b, δ 1 , and ω 1 as optimal control variables, and the feasible region of optimal control variables is U={u=(γ 1 ,γ 2 ,b,δ 1 ,ω 1 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ ω 1 ≤1,t∈[0,t f ]}, t f represents the optimal control terminal moment.
更优的,所述步骤S5中,成本代价函数用J(γ1,γ2,b,δ1,ω1)表示,,通过以 下公式确定:More preferably, in the step S5, the cost function is represented by J(γ 1 ,γ 2 ,b,δ 1 ,ω 1 ), and is determined by the following formula:
其中u1(t)=γ1,u2(t)=γ2,u3(t)=b,u4(t)=δ1,u5(t)=ω1。where u 1 (t)=γ 1 , u 2 (t)=γ 2 , u 3 (t)=b, u 4 (t)=δ 1 , u 5 (t)=ω 1 .
更优的,所述S6中,构造的拉格朗日函数如下:More preferably, in said S6, the constructed Lagrangian function is as follows:
更优的,所述S7中,构造的哈密顿函数如下:More preferably, in said S7, the constructed Hamiltonian function is as follows:
其中,λi(t),(i=1,2,3,4,5,6,7)为最优控制的协态变量。Among them, λ i (t), (i=1, 2, 3, 4, 5, 6, 7) is the optimally controlled co-state variable.
更优的,所述步骤S8中,构建的横截条件如下:More preferably, in said step S8, the transversal conditions of construction are as follows:
λi(tf)=0,i=1,2,3,4,5,6,7。λ i (t f )=0, i=1,2,3,4,5,6,7.
更优的,所述S8中,协态方程为:More optimally, in said S8, the co-state equation is:
其中,x1,x2,x3,x4,x5,x4,x7依次对应七个变量。Among them, x 1 , x 2 , x 3 , x 4 , x 5 , x 4 , x 7 correspond in turn seven variables.
更优的,所述S9中,系统最终的最优控制对为:More optimally, in said S9, the final optimal control pair of the system is:
本发明的有益效果为:The beneficial effects of the present invention are:
本发明充分考虑了目前的现实状况后用来模拟现实中PC-PLC配电网信息 物理系统的无线可充电传感器网络中恶意程序传播的情况:考虑了非线性感染 率,恶意程序感染传感器节点的能力并非固定不变,早期研究中假设的双线性 发生率与标准发生率都是极端的理想情况;考虑了异构,目前的电力网用到的 可充电传感器往往具有异构,异构可充电传感器以其良好的网络稳定性、可靠 性和生存性得到了广泛的应用于复杂场景;考虑了时滞,现实中恶意程序感染 传感器免疫节点并不能一下子使之失去免疫能力,往往有一定的延时,而且对 不同网络的延时不同。针对建立的PC-PLC配电网信息物理系统恶意程序传播 模型进行控制,提供了最优控制方案:构建针对控制恶意程序的成本代价函数, 根据模型的微分方程及成本代价函数构建哈密尔顿方程,求解协态方程组、最 优控制对,实现以最小的代价达到较好的控制效果。The present invention fully considers the current reality and is used to simulate the propagation of malicious programs in the wireless rechargeable sensor network of the PC-PLC distribution network information physical system in reality: considering the nonlinear infection rate, the rate of malicious programs infecting sensor nodes The capacity is not fixed. The bilinear incidence rate and the standard incidence rate assumed in the early research are extreme ideals; considering heterogeneity, the rechargeable sensors used in the current power grid often have heterogeneity, and heterogeneity can be recharged. Sensors have been widely used in complex scenarios due to their good network stability, reliability, and survivability; considering the time lag, in reality, malicious programs infecting sensor immune nodes cannot make them lose immunity all at once, and often have a certain Delay, and the delay is different for different networks. For the control of the established PC-PLC distribution network cyber-physical system malicious program propagation model, an optimal control scheme is provided: construct a cost function for controlling malicious programs, construct the Hamiltonian equation according to the differential equation and cost function of the model, and solve Co-state equations and optimal control pairs achieve better control effects at the lowest cost.
附图说明Description of drawings
利用附图对本发明作进一步说明,但附图中的实施例不构成对本发明的任 何限制,对于本领域的普通技术人员,在不付出创造性劳动的前提下,还可以 根据以下附图获得其它的附图。The present invention is further described by using the accompanying drawings, but the embodiments in the accompanying drawings do not constitute any limitation to the present invention. For those of ordinary skill in the art, without paying creative work, other embodiments can also be obtained according to the following accompanying drawings Attached picture.
图1是本发明基于PC-PLC配电网信息物理系统恶意程序控制方法流程图;Fig. 1 is the flow chart of the malicious program control method based on PC-PLC distribution network information physical system of the present invention;
图2是本发明PC、PLC无线可充电传感器网络的状态转化图。Fig. 2 is a state transition diagram of the PC and PLC wireless rechargeable sensor network of the present invention.
具体实施方式Detailed ways
以下结合具体实施例对基于PC-PLC配电网信息物理系统恶意程序控制方 法作进一步的详细描述,这些实施例只用于比较和解释的目的,本发明不限定 于这些实施例中。Below in conjunction with specific embodiment the malicious program control method based on PC-PLC power distribution network information physics system is described in further detail, and these embodiments are only used for the purpose of comparison and explanation, and the present invention is not limited in these embodiments.
实施例Example
为预防及应对恶意程序对电力信息物理系统信息造成的不良影响,本发明 实施例提供的基于非线性时滞异构模型的PC-PLC配电网信息物理系统恶意程 序传播模型,并提供了对应的最优控制方法。In order to prevent and deal with the adverse effects of malicious programs on the information of electric power cyber-physical systems, the embodiment of the present invention provides a PC-PLC power distribution network cyber-physical system malicious program propagation model based on nonlinear time-delay heterogeneous model, and provides corresponding optimal control method.
如图1所示,该基于PC-PLC配电网信息物理系统恶意程序控制方法,包 括以下步骤:As shown in Figure 1, the malicious program control method based on the PC-PLC power distribution network cyber-physical system includes the following steps:
S1:基于现实问题分析划分PL、PLC网络节点;S1: Divide PL and PLC network nodes based on analysis of real problems;
构建PC-PLC配电网信息物理系统恶意程序传播模型建模,将计算机网络 (PC网络)和可编程控制器网络(PLC网络)记为A网络以及B网络,A网络 和B网络的每一台设备对应一个节点,并根据节点被感染的程度,将其分类为 感染节点、易感节点、免疫节点和隔离节点。Build a PC-PLC power distribution network cyber-physical system malicious program propagation model modeling, record the computer network (PC network) and programmable controller network (PLC network) as A network and B network, each of A network and B network Each device corresponds to a node, and according to the degree of infection of the node, it is classified into infected nodes, susceptible nodes, immune nodes and isolated nodes.
S2:构建网络节点状态转移图;S2: Build a network node state transition diagram;
构建如图2所示的PC、PLC无线可充电传感器网络的状态转化图,假设 PC网络(A)包括易感状态节点(S)、感染状态节点(I)、隔离状态节点(Q) 以及免疫状态节点(R),PLC网络(B)包括易感状态节点(S)、感染状态节 点(I)、免疫状态节点(R),网络节点总数为N。假设PC网络的状态节点出 生率为μ1,新出生的状态节点有易感状态节点和免疫状态节点,其中,易感状 态节点占比为1-b,免疫状态节点占比为b;PLC网络的状态节点出生率为μ2, 新出生的节点均为易感状态节点。Construct the state transition diagram of PC and PLC wireless rechargeable sensor network as shown in Figure 2, assuming that the PC network (A) includes susceptible state nodes (S), infected state nodes (I), isolated state nodes (Q) and immune State node (R), PLC network (B) includes susceptibility state node (S), infection state node (I), immune state node (R), and the total number of network nodes is N. Assuming that the birth rate of state nodes in PC network is μ 1 , newly born state nodes include susceptible state nodes and immune state nodes, among which, the proportion of susceptible state nodes is 1-b, and the proportion of immune state nodes is b; the proportion of newly born state nodes in PLC network is The state node birth rate is μ 2 , and the newly born nodes are all susceptible state nodes.
定义γ1、γ2分别为PC、PLC网络感染状态节点病毒查杀率;μ1为PC网络 状态节点出生率及死亡率,μ2为PLC网络状态节点出生率及死亡率;b为PC 网络免疫状态节点出生占比;1-b为PC网络易感状态节点出生占比;θ1为PC网络易感状态节点由PLC网络引起的感染率;θ2为PLC网络易感状态节点 由PC网络引起的感染率;δ1为PC网络感染状态节点隔离率;ω1为PC网络隔 离状态节点恢复率;η1、η2为PC、PLC网络免疫状态节点失免率;τ1为PC网 络免疫状态节点失去免疫能力的延时,τ2为PLC网络免疫状态节点失去免疫能 力的延时;β1、β2、β3、β4、c、d、g、h均为正常数。Definition γ 1 and γ 2 are the virus killing rate of PC and PLC network infection status nodes respectively; μ 1 is the birth rate and death rate of PC network status nodes, μ 2 is the birth rate and death rate of PLC network status nodes; b is the immune status of PC network The birth ratio of nodes; 1-b is the birth ratio of nodes in the susceptible state of the PC network; θ 1 is the infection rate of nodes in the susceptible state of the PC network caused by the PLC network; θ 2 is the infection rate of nodes in the susceptible state of the PLC network caused by the PC network Infection rate; δ 1 is the PC network infection state node isolation rate; ω 1 is the PC network isolation state node recovery rate; η 1 , η 2 is the PC, PLC network immune state node loss rate; τ 1 is the PC network immune state node Delay of losing immunity, τ 2 is the delay of losing immunity of PLC network immune status nodes; β 1 , β 2 , β 3 , β 4 , c, d, g, h are all normal numbers.
对于PC网络易感节点,有新生节点投入,部分可能会被PC网络的感染状 态节点感染变为感染状态节点,也可能会被PLC网络的感染状态节点感染变为 感染状态节点,还有部分可能会因死亡移除。对于PC网络感染状态节点,部 分会被隔离,部分会被通过病毒查杀打补丁等措施变为免疫状态节点,还有部 分可能会因死亡移除。对于PC网络隔离节点,部分会被治疗恢复变为免疫状 态节点,还有部分会因死亡移除。对于PC网络免疫状态节点,有新生节点投 入,部分可能会失去免疫能力变为易感状态节点,还有部分可能会因死亡移除。For PC network susceptible nodes, if there are new nodes invested, some of them may be infected by infected nodes of PC network and become infected nodes, and may also be infected by infected nodes of PLC network and become infected nodes, and some may Will be removed on death. For PC network infection state nodes, some will be isolated, some will be turned into immune state nodes through measures such as virus inspection, killing and patching, and some may be removed due to death. For PC network isolation nodes, some will be recovered by treatment and become immune state nodes, and some will be removed due to death. For the PC network immune state nodes, there are new nodes input, some may lose immunity and become susceptible state nodes, and some may be removed due to death.
对于PLC网络易感节点,有新生节点投入,部分可能会被PLC网络的感 染状态节点感染变为感染状态节点,也可能会被PC网络的感染状态节点感染 变为感染状态节点,还有部分可能会因死亡移除。对于PLC网络感染节点,部 分会被通过病毒查杀打补丁等措施变为免疫状态节点,还有部分可能会因死亡 移除。对于PLC网络免疫状态节点,部分可能会失去免疫能力变为易感状态节 点,还有部分可能会因死亡移除。For PLC network susceptible nodes, if there are new nodes invested, some of them may be infected by the infection state nodes of the PLC network and become infected state nodes, or may be infected by the infection state nodes of the PC network and become infected state nodes, and some may Will be removed on death. For PLC network infection nodes, some will be turned into immune state nodes through measures such as virus inspection, killing and patching, and some may be removed due to death. For PLC network immune state nodes, some may lose immunity and become susceptible state nodes, and some may be removed due to death.
定义θxy(t)为易感节点具有相邻的感染状态节点的概率,x=1,2;y=1,2, 其中“1”代表PC网络,“2”代表PLC网络,即:Define θ xy (t) as the probability that a susceptible node has an adjacent infected node, x=1,2; y=1,2, where "1" represents the PC network, and "2" represents the PLC network, namely:
θ11(t)代表PC易感状态节点与PC感染状态节点相邻的概率,θ12(t)代表 PC易感状态节点与PLC感染状态节点相邻的概率,θ21(t)代表PLC易感状态 节点与PC感染状态节点相邻的概率,θ22(t)代表PLC易感状态节点与PLC感 染状态节点相邻的概率,具体如下:θ 11 (t) represents the probability that a PC susceptible state node is adjacent to a PC infected state node, θ 12 (t) represents the probability that a PC susceptible state node is adjacent to a PLC infected state node, and θ 21 (t) represents the probability that a PLC susceptible state node The probability that the susceptible state node is adjacent to the PC infected state node, θ 22 (t) represents the probability that the PLC susceptible state node is adjacent to the PLC infected state node, as follows:
定义一个PC网络的状态节点的度,用(i,j)表示,即表示为PC网络的某个 状态节点与i个其他PC网络的状态节点及j个PLC网络的状态节点相连接; 一个PLC网络的状态节点的度,用(k,l)表示,即意为PLC网络的某个状态节 点与k个其他PLC网络的状态节点及,l个PC网络的状态节点相连接;同时, 任意时刻满足以下关系:Define the degree of a state node of a PC network, represented by (i, j), that is, a certain state node of the PC network is connected with i state nodes of other PC networks and j state nodes of the PLC network; a PLC The degree of the state node of the network is represented by (k,l), which means that a certain state node of the PLC network is connected with k state nodes of other PLC networks and l state nodes of the PC network; at the same time, at any time Satisfy the following relationship:
S3:构建恶意程序传播模型的微分方程组;S3: Differential equations for building a malicious program propagation model;
PC-PLC网络节点状态转换微分方程如下:The PC-PLC network node state transition differential equation is as follows:
分别是在t时刻PC网络度为(i,j)的易感节点(S)、感染节点(I)、隔离节点(Q)、免疫节点(R)的数量,分别是在t时刻PLC网络度为(k,l)的易感节点、感染节点、免疫节点的数量,为PC网络度为(i,j)的各节点总数,为PLC网络度为(k,l)的各节点总数。 are the number of susceptible nodes (S), infected nodes (I), isolated nodes (Q) and immune nodes (R) with PC network degree (i, j) at time t, are the number of susceptible nodes, infected nodes and immune nodes with PLC network degree (k,l) at time t, respectively, is the total number of nodes with PC network degree (i, j), is the total number of nodes with PLC network degree (k,l).
S4:提出控制策略;S4: propose control strategy;
为有效抵御恶意程序的攻击,采用了对感染节点进行查杀并注射免疫补丁、 加大对感染节点移除隔离、对隔离节点进行查杀并注射免疫补丁以及加大新投 放的节点中免疫节点的占比几种措施。In order to effectively resist the attack of malicious programs, it adopts the method of killing infected nodes and injecting immune patches, increasing the removal and isolation of infected nodes, killing isolated nodes and injecting immune patches, and increasing the number of immune nodes among newly launched nodes. The proportion of several measures.
为实现优化目标,利用庞特里亚金极大值原理,选取γ1、γ2、b、δ1、ω1作为优化控制变量,优化控制变量的可行域为U={u=(γ1,γ2,b,δ1,ω1)|,0≤ γ1≤1,0≤γ2≤1,0≤b≤1,0≤δ1≤1,0≤ω1≤1,t∈[0,tf]},tf表示本次 最优控制的终端时刻。In order to achieve the optimization goal, γ 1 , γ 2 , b, δ 1 , ω 1 are selected as optimization control variables by using the Pontryagin maximum principle, and the feasible region of the optimization control variables is U={u=(γ 1 ,γ 2 ,b,δ 1 ,ω 1 )|,0≤ γ 1 ≤1,0≤γ 2 ≤1,0≤b≤1,0≤δ 1 ≤1,0≤ω 1 ≤1,t∈ [0,t f ]}, t f represents the terminal moment of this optimal control.
S5:构建成本代价函数;S5: Build a cost function;
成本代价函数用J(γ1,γ2,b,δ1,ω1)表示,,通过以下公式确定:The cost function is denoted by J(γ 1 ,γ 2 ,b,δ 1 ,ω 1 ), and is determined by the following formula:
其中u1(t)=γ1,u2(t)=γ2,u3(t)=b,u4(t)=δ1,u5(t)=ω1。where u 1 (t)=γ 1 , u 2 (t)=γ 2 , u 3 (t)=b, u 4 (t)=δ 1 , u 5 (t)=ω 1 .
S6:构造拉格朗日函数,引入拉格朗日乘子;S6: Construct a Lagrangian function and introduce a Lagrangian multiplier;
构造的拉格朗日函数如下:The constructed Lagrange function is as follows:
S7:构造哈密顿函数;S7: Construct a Hamiltonian function;
构造的哈密顿函数如下:The constructed Hamiltonian function is as follows:
其中,λi(t),(i=1,2,3,4,5,6,7)为最优控制的协态变量。Among them, λ i (t), (i=1, 2, 3, 4, 5, 6, 7) is the optimally controlled co-state variable.
S8:构建协态变量方程组和横截条件;S8: Construct costate variable equations and transversal conditions;
协态方程为:The costate equation is:
上式中,x1,x2,x3,x4,x5,x4,x7依次对应七个变量。In the above formula, x 1 , x 2 , x 3 , x 4 , x 5 , x 4 , x 7 correspond to seven variables.
构建的横截条件如下:The transversal conditions for the construction are as follows:
λi(tf)=0,i=1,2,3,4,5,6,7。λ i (t f )=0, i=1,2,3,4,5,6,7.
其中,得到优化条件为:Among them, the optimized conditions are:
即:Right now:
S9:求解最优控制对;S9: Solve the optimal control pair;
求解答得到系统最终的最优控制对为:Solve the solution to get the final optimal control pair of the system as:
本发明上述实施例,重点是建立PC-PLC配电网信息物理系统恶意程序传 播模型,该模型充分考虑了目前的现实状况后用来模拟现实中PC-PLC配电网 信息物理系统的无线可充电传感器网络中恶意程序传播的情况的。该模型考虑 了非线性感染率、异构、时滞等因素。本发明针对建立的PC-PLC配电网信息 物理系统恶意程序传播模型进行控制,提供了最优控制方案;构建针对控制恶 意程序的成本代价函数,根据模型的微分方程及成本代价函数构建哈密尔顿方 程,求解协态方程组和最优控制对,实现以最小的代价达到较好的控制效果。The above embodiments of the present invention focus on establishing a malicious program propagation model of the PC-PLC distribution network information physical system, which is used to simulate the wireless communication of the PC-PLC distribution network information physical system after fully considering the current reality The situation of malicious program propagation in charging sensor network. The model takes into account factors such as nonlinear infection rate, heterogeneity, and time lag. The present invention controls the malicious program propagation model of the established PC-PLC distribution network information physical system, and provides an optimal control scheme; constructs a cost function for controlling malicious programs, and constructs the Hamiltonian equation according to the differential equation and the cost function of the model , to solve the co-state equations and the optimal control pair to achieve a better control effect at the minimum cost.
最后应当说明的是,以上实施例仅用以说明本发明的技术方案,而非对本 发明保护范围的限制,尽管参照较佳实施例对本发明作了详细地说明,本领域 的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换, 而不脱离本发明技术方案的实质和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, rather than limiting the protection scope of the present invention, although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand , the technical solution of the present invention may be modified or equivalently replaced without departing from the spirit and scope of the technical solution of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210896796.8A CN115643579A (en) | 2022-07-28 | 2022-07-28 | Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210896796.8A CN115643579A (en) | 2022-07-28 | 2022-07-28 | Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115643579A true CN115643579A (en) | 2023-01-24 |
Family
ID=84939959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210896796.8A Pending CN115643579A (en) | 2022-07-28 | 2022-07-28 | Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115643579A (en) |
-
2022
- 2022-07-28 CN CN202210896796.8A patent/CN115643579A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109145428B (en) | A Vulnerability Assessment Method for Cyber-Physical Fusion System under Cascading Failure Mode | |
CN107682195B (en) | Robustness evaluation method of communication network based on the combination of complex network and big data | |
CN112929205B (en) | Swarm unmanned plane fault propagation method based on cellular automaton | |
CN106656571A (en) | Clustering wireless sensor network malicious program propagation model based on evolution game | |
CN110887173A (en) | Method and device for remotely controlling central air-conditioning system | |
CN104980440B (en) | Big data transmission method for active distribution network based on content filtering and multi-agent cooperation | |
CN108388975A (en) | A kind of Information Security Risk transmission control method and device based on Epidemic Model | |
CN112636357A (en) | Power grid vulnerability analysis method based on reinforcement learning | |
CN113660241A (en) | Automatic penetration testing method based on deep reinforcement learning | |
CN111343180A (en) | Multi-type malicious program attack and defense method based on nonlinear rechargeable sensor network model | |
CN116560240A (en) | Computer readable storage medium and second order multi-agent consistency control system | |
CN115643579A (en) | Method for controlling malicious programs of information physical system of power distribution network based on PC-PLC | |
CN115913704A (en) | A time-delay pulse control method for intelligent unmanned swarm system against spoofing attack | |
CN111224942B (en) | Malicious software propagation control method and device based on ternary association diagram detection | |
CN117792749A (en) | Dynamic industrial control honeypot deployment method based on deep reinforcement learning | |
CN116318828A (en) | A kind of industrial Internet virus prevention and control method | |
CN103051537B (en) | IP Circuit Service transmission dispatching method and system | |
CN114139374B (en) | Industrial robot system attack chain modeling method based on Petri network | |
CN113282881B (en) | Electric power information physical system robustness analysis method based on reachable matrix | |
CN116782423A (en) | A method for optimizing information transmission in coal and rock cutting status identification systems | |
CN116668067A (en) | A Distributed Hybrid Network Attack Detection Method for Interconnected Nonlinear Cyber-Physical Systems | |
CN117171751A (en) | Patch optimization restoration method and system for industrial Internet of things malicious program propagation | |
CN115499153B (en) | An optimal control method for power CPS worm virus based on benign worm interaction | |
CN109858763A (en) | A kind of building method and device of the electric power industrial control data message based on GAN | |
Carpenter | Production-optimization strategy using a hybrid genetic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |