Resilience to denial-of-service and integrity attacks: A structured systems approach
نویسندگان
چکیده
The resilience of cyberphysical systems to denial-of-service (DoS) and integrity attacks is studied in this paper. system modeled as a linear structured system, its an attack interpreted graph theoretical framework. structural the characterized terms unmatched vertices maximum matchings bipartite connected components directed representations under attack. We first present conditions for be resilient DoS when adversary may block access or turn off certain inputs system. extend analysis characterize might additionally have ability affect implementation state-feedback control strategies. This termed establish which that structurally will also class attacks. Finally, we formulate extension case switched systems, derive such
منابع مشابه
Recursive Replication: A Survival Solution for Structured P2P Information Systems to Denial of Service Attacks
Structured Peer to Peer overlays have shown to be a very good solution for building very large scale distributed information systems. Most of them are based on Distributed Hash Tables (DHTs) that provide an easy way to manage replicas, thus facilitating high availability of data as well as fault tolerance. However, DHTs can also be affected by some well known Distributed Denial of Services atta...
متن کاملDenial of Service Attacks
Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...
متن کاملDenial of Service Attacks
................................................................................................................................................................4
متن کاملDenial-of-Service Attacks
Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-ofservice (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s Internet. The main aim of a DoS is the disruption of services by attempting to limit access to a mac...
متن کاملDenial of Service / Distributed Denial of Service MANAGING DoS ATTACKS
DISCLAIMER: To the extent permitted by law, this document is provided without any liability or warranty. Accordingly it is to be used only for the purposes specified and the reliability of any assessment or evaluation arising from it are matters for the independent judgment of users. This document is intended as a general guide only and users should seek professional advice as to their specific...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Journal of Control
سال: 2022
ISSN: ['0947-3580', '1435-5671']
DOI: https://doi.org/10.1016/j.ejcon.2021.09.005