Min Xie - Cyber-Physical Distributed Systems
Здесь есть возможность читать онлайн «Min Xie - Cyber-Physical Distributed Systems» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Cyber-Physical Distributed Systems
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:3 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 60
- 1
- 2
- 3
- 4
- 5
Cyber-Physical Distributed Systems: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cyber-Physical Distributed Systems»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
SYSTEMS
Gather detailed knowledge and insights into cyber-physical systems behaviors from a cutting-edge reference written by leading voices in the field Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications
Cyber-Physical Distributed Systems
Cyber-Physical Distributed Systems
Cyber-Physical Distributed Systems — читать онлайн ознакомительный отрывок
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cyber-Physical Distributed Systems», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
Several works consider both the vulnerability and performance of complex systems subject to attacks [201–207,222,223]. These works generally describe a case as a dynamic contest between an attacker and a defender to develop a component vulnerability model and a multi‐state system performance model. The number of destroyed components quantifies the demand loss and expected damage costs [200,205]. To make the above contest more realistic, attack time uncertainties and the attacker's preference on the attack time should be considered.
In the literature, two different approaches exist for determining the attack time, that is, the strategic selection and the selection based on probability distributions. In the former, the attacker strategically selects whether to attack at some point in time or at a later point in time, based on the outcome of the game, given that the attack occurs at a specific time [224]. Thus, complex attack and defense strategies can be derived from a two‐stage min‐max multi‐period game. Extensive attack or defense in one period limits the attack or defense that can be exerted in the next period, and vice versa. Thus, players strategically choose whether to exert effort now or in the future [224–226]. The defender may determine optimal resource allocation strategies for redundancy [192] and protection, that is, individual or overarching protection [205,227–229]. On the other hand, the attacker may distribute the constrained resources optimally across sequential attacks [230–233].
In the second approach, the attacker prefers to conduct the attack at the time of the critical event [206]. Indeed, attacks in Nice, Berlin, Manchester, and London occurred several days before and after Bastille Day, Christmas, a concert, and the Champions League 2017 Final, respectively. In these cases, the defenders have increased the protection level in the immediate aftermath; therefore, it is not worthwhile and cost‐effective for the attacker to deploy another attack in a short period. Because attacks occurred at critical times, they can greatly influence public opinion. As a result, the attacker aims to maximize the system loss by strategically selecting a set of elements to attack based on the two‐stage min‐max game [234]. Because we can predict the distribution of the time at which the critical event occurs, the attack time can be inferred from a data‐driven probability distribution [192]. The two approaches aim to maximize the outcomes of the game given that the attack occurs at a specific time under a similar system structure and variable resources.
The truncated normal distribution is used to describe the uncertainty of the most probable attack time, that is, the time of the critical events, and the accuracy of the defender's estimate of it [206,235,236]. The truncated normal distribution has been adopted to represent uncertainties in many realistic applications, for example, traffic peaks of online video websites [193], the peak season of power supplies [237–239], the peak demand of water distribution systems [240], and the rush hour of public transportation [241]. Accounting for the influence of this uncertainty increases the relevance of the insights gained for the optimal resource allocation strategy against attacks.
CPSs are a new class of engineered complex systems that provide tight interactions between cyber and physical components. The corruption of a small subset of their components has the potential to trigger system‐level failures leading to entire system performance disruptions [191,215,221,242]. Previous studies on attack vulnerability and performance of complex systems can be extended to identify resource allocation strategies for cyber components and promote system performance during cyber‐attacks in CPSs [243,244]. Cyber vulnerabilities are exploited by attackers to launch insidious attacks on the integrity, confidentiality, and availability of cyber data by injecting false data into measurement devices, eavesdropping estimation of system states, and deploying denial of service (DoS) attacks on communication networks [216,217,220,245]. More sophisticated attack models specifically target weaknesses to cause maximal damage [191]. In this respect, it is key to capture the uncertainties intrinsic to the behavior of the attacker and the defender.
With respect to applications in smart grids, upgrading traditional grids to smart grids has brought many benefits to the overall management of power and energy systems, including higher reliability, better efficiency, improved integration of RERs, more flexible choice for stakeholders, and lower operation costs [246–248]. However, the core technologies, for example, communication techniques and SCADA systems [249–252], which deliver the advantages of smart grids, also open the grids to vulnerabilities that already exist in the information and communications technology (ICT) world. These vulnerabilities pose threats to smart grids, such as DoS attacks, false data injection, replay attacks, privacy data theft, and sabotage of critical infrastructure [253–255]. In addition, the failures in a smart grid caused by cyberattacks can easily cascade to other highly dependent critical infrastructure sectors, such as transportation systems, wastewater systems, health care systems, and banking systems, resulting in extensive physical damage and social and economic disruption [249,256].
While government, the private sector, and academia are recognizing the cyber vulnerability of smart grids, the likelihood and impact of a cyberattack are difficult to quantify. Furthermore, for a smart grid, there may be mandatory standards and operational requirements from grid stakeholders. Current risk management strategies are generally qualitative or heuristic [257]. In these strategies, some assumptions, for example, constant reward with respect to successful anti‐cyberattack [258,259], may be unrealistic for most smart grids.
Chapter 7presents a probabilistic risk analysis framework to enhance smart grid cyber security. In particular, the dynamic and stochastic characteristics of smart grids, such as uncertain demands, are taken into account to investigate the effect of defending strategies on the real operation cost. The optimal power flow (OPF) model [260] is applied to an 11‐node radial smart grid originating from the Elia grid in Belgium. Compared with the existing studies that focus on the inherent risk [254,260], such as the natural degradation and uncertain RERs for better maintenance actions and power dispatch, Chapter 7addresses the impact of the external threat (cyberattacks) on the operation cost for effective deployment of cyber defense teams. In previous works, the cost of each attack on a node was assumed to be a constant [259]. Nevertheless, by investigating some practical scenarios, it has been found that the costs are more likely to be determined by some adversarial factors. Therefore, an adversarial cost sequence associated with each node is assumed, and a widely used variation constraint is introduced for each cost sequence. To cope with the objective of sequential decision strategies, the problem is formulated using the reinforcement learning framework [261–263]. In particular, the Bayesian prior method [259] is employed for the model parameters, and the problem is formulated as a Bayesian adversarial multi‐node bandit model. In addition, a Bayesian minimax type regret function is constructed, which is subject to the learning context.
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Cyber-Physical Distributed Systems»
Представляем Вашему вниманию похожие книги на «Cyber-Physical Distributed Systems» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Cyber-Physical Distributed Systems» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.