首页 | 本学科首页   官方微博 | 高级检索  
     检索      

信息物理融合系统中恶意软件传播与分岔控制策略
引用本文:于振华,谢文军,马志强,欧阳洁.信息物理融合系统中恶意软件传播与分岔控制策略[J].系统工程理论与实践,2017,37(10):2744-2752.
作者姓名:于振华  谢文军  马志强  欧阳洁
作者单位:1. 空军工程大学 信息与导航学院, 西安 710077;2. 空军工程大学 航空航天工程学院, 西安 710038
基金项目:国家自然科学基金(61202128,71571190)
摘    要:针对恶意软件在信息物理融合系统中传播机理难以描述的问题,利用非线性动力学理论构建其传播动力学模型,并基于稳定性理论和Hopf分岔定理对该模型的复杂动力学行为进行分析.为了控制恶意软件传播所引发的Hopf分岔,根据分岔控制理论设计了一类结合参数调节法与状态反馈法的混合分岔控制策略,并深入研究控制参数对Hopf分岔点位置及极限环幅值的影响.数值仿真结果表明所设计的混合分岔控制策略不仅能够提前或推迟Hopf分岔点,而且可以改变极限环幅值大小,使信息物理融合系统产生预期的动力学行为,实现控制目的,从而有效降低恶意软件的危害.

关 键 词:信息物理融合系统  非线性动力学  恶意软件  Hopf分岔  分岔控制  
收稿时间:2016-02-25

Mechanism and bifurcation control of malicious software spreading in Cyber-physical systems
YU Zhenhua,XIE Wenjun,MA Zhiqiang,OUYANG Jie.Mechanism and bifurcation control of malicious software spreading in Cyber-physical systems[J].Systems Engineering —Theory & Practice,2017,37(10):2744-2752.
Authors:YU Zhenhua  XIE Wenjun  MA Zhiqiang  OUYANG Jie
Institution:1. School of Information and Navigation, Air Force Engineering University, Xi'an 710077, China;2. School of Aeronautics and Astronautics Engineering, Air Force Engineering University, Xi'an 710038, China
Abstract:As it is difficult to describe the malicious software spreading mechanism in Cyber-physical systems (CPS), a spreading dynamics model is proposed, and its dynamic behaviors are analyzed based on the stability theorem and Hopf bifurcation theorem. To control Hopf bifurcations that are caused by the malicious software spreading, a hybrid bifurcation controller combining the parameter adjustment method and state feedback method is designed. The effect of its parameters on the position of Hopf bifurcation point and the amplitude of limit cycle is discussed in detail. The numerical simulation results show that the hybrid bifurcation controller can not only make the Hopf bifurcation occur early or later, but also change the amplitude of the limit cycle. The hybrid bifurcation controller makes CPS generate the expected dynamic behaviors, and effectively reduces the impact of the malicious software.
Keywords:Cyber-physical systems  nonlinear dynamics  malicious software  Hopf bifurcation  bifurcation control  
本文献已被 CNKI 等数据库收录!
点击此处可从《系统工程理论与实践》浏览原始摘要信息
点击此处可从《系统工程理论与实践》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号