ty -jour a2 -de aguiar,M.Au -Mangel,Marc au -McEver,Jimmie PY -2021 DA -2021/09/07 TI-建模耦合的非线性多层多层动力学:网络攻击和电动电网SP -55584123 VL -55584123 VL-2021 AB-我们研究了网络攻击,防御和恢复在系统中的后果,通过网络系统可以通过将模型从疾病的种群生物学扩展到网络系统的先前应用,并耦合网络系统到物理系统,使用电网同步模型。与疾病模型类似,在网络系统中,个体易感,感染或恢复的疾病模型,组成部分可能是不妥协的,并且容易受到攻击,毫不妥协,并且暂时不受攻击,妥协或重置,因此无法为性能做出贡献物理系统。我们以类似于适应性免疫系统的方式对网络防御对策进行建模。我们通过(i)网络系统状态与物理系统的性能之间的一般非线性关系,将物理系统的物理系统和网络系统链接起来,该指标取决于网络系统的状态。(ii)电网的同步电机模型由许多客户组成,其智能电表可能会受到损害,其中转子角度差异的稳定状态是性能的指标。我们使用耦合模型(两者都具有新兴属性)来研究两种情况。首先,当隐藏依赖隐形妥协的攻击者直到在常规维护过程中检测到它或启动攻击为止。随着时间的流逝,妥协的概率仍未被发现,妥协水平随时间增加。 Because of these dynamics, an optimal time of attack emerges, and we explore how it varies with parameters of the cyber system. Second, we illustrate one of the Electric Power Research Institute scenarios for the reverse engineering of Advanced Metering Infrastructure (AMI) by coupling the synchronous motor equations for the generator and utility to the model of compromise. We derive a canonical condition for grid failure that relates the level of compromise at the time of detection of compromise and the dissipation parameter in the synchronous motor model. We conclude by discussing the innovative aspects of our methods, which include (i) a fraction of decoy components in the cyber system, which are not connected to the rest of the cyber system or the physical system and thus do not spread compromise but increase the probability of detection of compromise, (ii) allowing components of the cyber system to return to the un-compromised state either temporarily invulnerable or immediately vulnerable, (iii) adaptive Defensive Counter Measures that respond in a nonlinear fashion to attack and compromise (in analogy to killer T cells of the immune system), (iv) a generic metric of performance of the physical system that depends upon the state of the cyber system, and (v) coupling a model of the electric grid to the model of compromise of the cyber system that leads to a condition for failure of the grid in terms of parameters of both compromise and the synchronous motor model, directions for future investigations, and connections to recent studies on broadly the same topics. We include a pseudocode as an Appendix and indicate how to obtain r第一作者的模型脚本。SN -1076-2787 UR -https://doi.org/10.1155/2021/5584123 do -10.1155/2021/5584123 JF-复杂性PB -Hindawi KW- hindawi kw -er-er- er- er- er-