• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure design for cloud control system against distributed denial of service attack

    2018-04-04 03:48:59YasirALIYuanqingXIALiangMAAhmadHAMMAD
    Control Theory and Technology 2018年1期

    Yasir ALI,Yuanqing XIA,Liang MA,Ahm ad HAMMAD

    School of Automation,Beijing Institute of Technology,Beijing 100081,China

    1 Introduction

    Nowadays,feedback control system s are getting significant importance in m any technical fields[1,2].In the conventional design of control system s,all system components,including sensors,controller,actuator,and plant,are installed in a local unit.This arrangement leads to a high cost of constructions,communication constraints,and lack of flexibility.Thanks to the development of Information and Communication Technologies(ICTs),which greatly facilitated the integration of advanced technologies into old designed control system s[3].As we know that m any functionalities are included in modern days NCS for example,contraction in size,quickness,working for a long time,etc.To achieve these functionalities an NCS needs huge flexible computational resources with smaller size,which seem s difficult to be achieved with the conventional design of NCS.For example,a small robot has limit resources such as limitations of processing power,battery life and the most important is the size.with the development of Cloud Computing Technologies(CCTs),the resourcec on strained NCS issues are solved.The combination of CCTs and NCS made it possible to save energy,which saves the processing energy used in the conventional design of NCS,and thus works for long time[4]and reduces size of NCS by shifting the main processing unit to the cloud server.The favorable achievement of this integration is the massive paralleled computation on the cloud server[5].One real-world application of the cloud control system is Google self-driving car,which determines its accurate position by sharing sensor information with stateliest and cloud[6].Fig.1 illustrates some of the applications of the cloud-based control system which are using cloud computing resources for their better performance.James Kuffner,in 2010 first used the term “Cloud Robotics”and described how we can control the robots from the cloud[7].Recently,Jiafu Wan explained the recent development and challenges in cloud robotics[8].Although there are many advantages of using cloud for different resources,still there are many security challenges related to the cyber and physical part of the system.Local controller and cloud server use packets to transmit the sensor information and the feedback control signal between them.This communication could be subject to different kinds of security attacks,for exam p le,1)Eavesdropping:in which the attacker only watches the information but no modification;and 2)Modification attack:in which the attacker modifies the message and sends the wrong solution to the local controller.Here we will consider the distributed denial of service(DDoS)attack on the local controller in which local controller receives real-time solutions from the cloud server and is under DDoS attack.DDoS attack is one of the most dangerous attacks,which has the ability of completely disconnect an organization(e.g.,the local controller)off from the internet,causing significant packet dropout or dramatically slowing down network links[9].Pirathayini Srikantha and Deepa Kundur in[10]show ed that the cyber-enabled power grid becomes unstable when there is a DDoS attack.In[11]Hakem Beitollahi and Geert Deconinck showed that DDoS attacks a)produce long delay jitter on NCS packets,which may causes the whole CS to take away from the reference line,and b)cause excessive packet loss.When the loss rate exceeds a specific threshold,the control system becomes unstable.This literature show s that DDoS attack is very hazardous for the cloud-based control system,which should be protected for their better normal operation.

    Fig.1 Different applications of cloud-based control system s.

    1.1 Related work

    In the last several years,m any people did research on NCSs,such as model predictive control for NCSs[12],event-based model predictive control for nonlinear continues time NCS[13],H∞control for NCSs[14]and enhanced stability analysis for NCSs[15].These works study the control challenges for NCSs by considering different disturbances,packet dropout’s detections and fault detections techniques.These proposed methodologies are compatible to meet the requirements of control problem s;however,these techniques cannot be directly app lied to modern architectures of CCS,which is an extension to NCSs[1,16].The trend for NCSs is now changing by adopting the modern cloud computing technologies because of their ability to handle heavy computational processing power for different tasks[17]and to produce different excellent control objectives[5,6,18,19].Many people focused their research on the applications of CCSs,but the fact is that very less work has been done on the security issues of CCSs.The DDoS attack,which is very easy to launch by using some attacking tools easily available on internet for free and can cutoff a CS completely from the cloud,should be addressed properly.Our work is related to[3],in which Zhiheng Zhu et al.tried to build a secure design by applying cryptographic technique and produced resiliency by building as witching techniques on local CS.In our work,we will establish a real-time detection mechanism for traffic packets coming from the cloud to ensure whether DDoS attack is launched or not.Some methods are also designed to deal with the security issues of the networked based control system(NBCS),for example,Men Long et al.in[9]quantitatively investigate the performance degradation of NBCS under DoS attack.Our work in addition will add authentica-ti on technique and switching mechanism(SM)for stability of NCS.Hakem Beitollahi et al.in[11]introduced a Fosel architecture,where the network traffic is routed to overlay network before the target node,where malicious packets are filtered and only legitimate packets are allowed to go forward.This technique greatly reduces the saturation of buffer of computational processing unit(CPU)and bandwidth of the targetnode,however to use this method,every time we have to build complete overlay network before the CS node in the network,which will be time consuming and expensive method.In our work we will develop a true detection method for CCSs for the verification of DDoS attack.After we perceive the existence of DDoS attack,we will apply our proposed defense mechanism to protect the CS from being going to unstable state.

    1.2 Organization

    The rest of paper is organized as follow s:Section 2 presents the problem statement that how an adversary can lunch a DDoS attack along with some assumptions we have made.In Section 3,we discuss model predictive control(MPC).Section 4 gives a detection technique against DDoS attack.In Section 5,the proposed mitigation technique is presented.Section 6 shows the performance evaluation by presenting simulation results.Section 7 presents conclusions and future work.

    2 Problem statement

    The trend for new control system is nowadays changing to the new design of control system,i.e.,the integration of cloud with the conventional NCSs.The development of ICTs made it possible for the old designed resource constraint,high power consuming and offline controllers to modify to the modern,powerful and on line controller in the cloud.The local controller will receive the real-time solution for their better dynamic optimization to the reference values from the cloud.However,the control solution coming from the cloud can be subjected to DDoS attack.The adversary will try to suppress the channel bandwidth by launching DDoS attack,thus by doing so the adversary will try to impede the NCS from receiving the control solution with the aim to make the NCS unstable.The adversary already know s that if the control system does not receive the control solution continuously from the cloud while it is in running condition,the NCS will become unstable,overshoot will become vulnerable to destructive situations.In this paper,we will address this issue by introducing a monitoring and mitigation technique against DDoS attack.In the next section,we will discuss in detail that,how an adversary can launch DDoS attack on the NCS.

    2.1 Attack model and assumptions

    We as sum ed that the attacker floods extremely large amount of bogus packets on the IP address of the controller of the NCS,fully occupying the link band width and pausing the CPU.

    The discussion from some literatures show s that DDoS attack is one of the easiest type of attack for the attackers,happening in the history[20].In order to launch aDDoS attack the attacker normally follows such several steps.First of all,he has to build a network of infected computer.These computer machines are named as zombies or bots[21].The cyber attacker norm ally follow s some tricks and techniques to find such infected machines on internet,e.g.,scanning technique[22],etc.and sometimes locate more than thousand infected machines on intern et.After the infected machines are found out,the next step is to install some programs known as attacking tools,which are easily available on internet.Then with the help of a Handler(a machine which handles the attacking command),the cyber-attacker can easily launch a DDoS attack using these com promised machines.Fig.2 show s a general scenario of DDoS attack on local host of cloud control system.We could consider some practical application of CCS,for example,Amazon package delivery drone[3],Google self driving car[6],etc.If the NCS in such system s are under DDoS attack and could not receive the real-time solution from cloud,the CS will go to an unstable state and will lead to destructive situations.The first step of our mecha-nism deals with establishing a monitoring mechanism by using covariance matrix detection technique.And if it discovers any DDoS attack,we will apply a mitigation technique.The mitigation approach is com posed of two parts,i.e.,filtering with verification and SM.

    Fig.2 A general scenario of NCS under DDoS attack.

    3 MPC in cloud

    Nowadays,MPC is widely used as an advanced method for controlling of different processes in many areas of the modern day’s dynamic complex control system s,because of their two most important properties,i.e.,prediction and optimizations[12,17].MPC is a model based control algorithm that estimates the moving time finite horizon system model to predict the future behavior of NCS[3].The idea of MPC is to compute a control signal in such a way,which can minimize the objective function of the system.The main advantage of the MPC is to optimize the current time slot of system by considering the real-time constraints on the system states[23].This property is difficult to be achieved in other control strategies,such as linear quadratics regulator(LQR)and H∞optimal control.

    As we know that MPC has the ability to deal with the complex control system by processing heavy computation,this fact gives us motivation to out-source the MPC processing part to the cloud server in CCS architecture[24].Cloud gives us the suitable platform by providing services like SaaS,PaaS and IaaS on the“Pay as you go”scheme.

    Let us describe the NCS dynamics by using a discretetime linear state-space model,

    where x(k)∈ Rn×1is the state vector of the NCS,x(0)=x0∈ Rn×1is the given initial state value,u(k) ∈ Rl×1is the control input,A ∈ Rn×nand B ∈ Rn×lare constant matrices.

    The MPC optimization equation[3]at each sampling discrete time k computed at cloud server is given by P,as shown below

    subject to

    where J:Rn×l× RlN×l→ R is the objective function,η is a tuning parameter for the desired control performance,and U(k)∈ RlN×1is the solution sequence of the problem P.For the sake of simplicity,it is convenient to transform(1)to standard matrix form,for which we redefine(1)as follows:

    with the definition(3)the optimization equation(2)takes the new shape

    To eliminate the independent term of U(k)the following equations are defined

    where I is an identity matrix and I∈ RlN×lN,H ∈ RlN×lNand the length of vector is lN.Using(6),the matrix form of the optimization equation is written as below:

    with the constraints given as follow s:

    where E ∈ Rm×lN,G ∈ Rp×lN,c ∈ Rm×1,d ∈ Rp×1are constraint matrices and vectors.The standard matrix form can thus be defined by set of values ?={H,E,G,q,c,d},w hich NCS needs to send to cloud.

    4 Covariance matrix detection modeling and detection approach

    Covariance matrix detection approach is identical to a second-ordered statistic,a detection technique,that utilizes the characteristics difference between the features of normal traffic flow and DDoS attack flow.Whenever there is DDoS attack on a victim node in the network,changes are observed in the traffic flow information.For example,the packet rate,the number of packets to the same host,the number of connections to the same host,the number of connection that have“SYN”errors to the same host,and so on,for more detail the readers could refer to[25]to which our work is an application.The traffic stream s(coming from and going to the cloud)are obtained by a network-monitoring device through continuous sampling process which is segmented in no noverlapped and equal sequences as shown in Fig.3.It is supposed that for every captured samples sequence there are p features observed,represented by a random vector x=(f1,f2,...,fp)T.Here it should be noted that the random vector x shall not be confused with state value x of NCS given in MPC section.Let x1,x2,...,xnbe the n observations w hereis the i th observed vector.A new variable y is defined related to the p features of the i th sequence,represented as

    with the general form of x can be given as1≤k≤n,the definition can be written in detail as below:

    Fig.3 Sample sequences taken by network monitoring device.

    Covariance matrix detection technique works in three phases.In the first phase,the normal traffic stream between cloud and NCS is saved in the small database located at NCS,this process is named as training session which is done by evaluating the mathematical expectations of all the covariance matrices of non-overlapped sequences.In the second phase the testing covariance matrix samples are evaluated and the differences between the covariance matrices of normal traffic and testing covariance matrix are determined by utilizing a Det(·)function.If the changes are significant,DDoS attack is signaled.Let suppose the sample of observed covariance matrix is denoted by Mobsand the normal traffic profile is denoted by the detection function between these two are denoted as follows:

    Here T is the detection threshold matrix,which defines the limits of the features to which thecan be changed.Let us suppose the variable E(Ml)is the mathematical expectations of all covariance matrices of the normal traffic and Mlis the covariance of the l th sample sequence.Thus threshold matrix is given as

    If the value of above Det(·)function is 0,it means that no significant differences are happened in features.If the value is 1,it means that there are sudden changes occurred due to DDoS attack.

    5 Mitigation approach

    In this paper,we proposed a mitigation technique against DDoS attack.In DDoS attack,the attacker aim s to slow down the connection speed or completely cut off the NCS from the cloud by sending many useless packets to the IP address of NCS.Also the attacker may try to show that he is the legitimate sender for required solution from the cloud by applying IP spoofing techniques.For such type of attacks,we proposed methodology which is named as authentication and SM.Below we are providing detail about these mechanism s.

    5.1 Authentication

    5.1.1 Filtering

    If the DDoS attack on the system is verified,then the very important step is to block unknown packets.Therefore,in our proposed mechanism we built a filtering mechanism for blocking the unknown IP packets.For this purpose,a database will keep the records of the unknown packets,and whenever a new unknown packet is detected from an unknown IP address it will be saved in the database memory as shown in Fig.4.It is also possible that the attacker spoofs the packet with cloud IP address.In such case we provide an idea of verification.

    Fig.4 Proposed mitigation flow chart for NCS against DDoS attack.

    5.1.2 Verifi cation

    To ensure that no false message gets enter to the system we built a verification mechanism.Let’s suppose y(k)is the solution from the cloud,then were write(7)with the short hand notation as below:

    Let AKbe the dual case problem s for P and aK(λ,s)be the value of AK.Because of dual decision variables,Slater’s condition is verified and thus strong duality holds,i.e.,aK(λ,s)=Jk(y),when y(k)is the solution to P,and λ and s are solutions to AK.Then the only possible solution from the cloud could be characterized by Karush Kuhn Tucker(KKT)condition,which states that y will be the solution to P if and only if y,s and λ satisfy

    Using(12),we arrive at

    Hence,instead of checking(16)directly,we can check(17).This verification can be performed v times by generating the random r vector v times.

    Lemma1[3]The proposed mechanism ensure that a false solution cannot succeed in the verification mechanism with a probability greater than(1/2)v.

    5.2 Switching mechanisms

    As we know that when NCS is in operation(maybe in the middle of the task),then it is very crucial for NCS to be remain connected with cloud to receive the realtime guidance from the cloud,at that instance DDoS attack will slow down the connection between the NCS and cloud or may cut off the connection for a while.The proposed SM will ensures mitigation of the performance degradation.We designed a two modes SM for our NCS,i.e.,cloud mode and local controller mode.The switching between these two modes are classified by error rate Rerrorbetween reference and optimized solutions from the cloud server.We defined a sustainable threshold error value,i.e.,RThwhich the NCS can withstand from being going to a completely unstable state.

    a)Cloud mode:When Rerror<RTh,it means that a satisfied amount of correct solutions is arriving every sampled time,which can be applied to NCS for controlling the normal operations.The error rate is expected to be minim um than RThin this cloud m ode.

    b)Local control m ode:When Rerror>RTh,it means that the arriving of correct solution is at lowest minimum rate,which produces error rate greater than RTh.This will lead the system to unstability if remained in this condition.To guarantee the stability at this state,we have designed a local control mode mechanism by using H∞control theory.The NCS will automatically switch to a local control mode to ensure the system stability,bringing the system to a safe mode.

    5.3 Local controller design

    In case of unavailability of solution signal from the cloud because of DDoS attack,the stability of NCS is very essential to be maintained.One practical approach is to sw itch the NCS to local control mode,for which most suitable control mechanism is H∞Optimal control as a local control because of property of dealing with complex disturbance in off-line situations[26].

    Suppose k+t be the time when switching condition holds,the system is switched to local control mode where k is the sample of time when last correct solution was received from the cloud.The state values,control input and disturbance in local mode are represented by notation xsm(k),usm(k)and wsm(k),respectively.The system in local control mode can be given as

    where zsm∈ Rnis the output of system,C ∈ R(n×n)is an identity matrix.By using H∞optimal controller,our goal is to find an optimal control solution usm(k)=KLocal(xsm(k))for the condition that the supernums ofholds,where α > 0 is a given constant.Then H∞Optimal controller for the above local system is given as

    where γ satisfies the follow ing algebraic Riccati equation,

    where Qx=CTC and main condition for the above controller is given by

    For every smallestαthat satisfies(20)we can calculate local controller gain KLocalusing(19),which guarantees the stability of the NCS[3].

    6 Network layout for simulation

    6.1 Simulation conceptual

    To prove the efficiency of our proposed mechanism,we selected the dynamics of hovering unmanned arial vehicle(UAV)using the state value s defined as s=[px,py,pz,vx,vy,vz,φ,θ,ψ,pa,qa,ra,as,bs],where Table 1 gives description of each variable.The matrices A and B are given in[27].

    Table 1 Description of parameters used in UAV dynamic.

    Our simulation network layout contains 6 nodes placed on different locations of our Lab LAN network as shown in Fig.5.PC1(with 2GB RAM memory&2.3GHz processor)has assigned the job of local controller host and PC2(with 8GB RAM&2.7GHz processor)has assigned the job of cloud host while PC3 to PC6 were declared as zombie computers.PC1 operates two software applications as local controller host.One is MATLAB-2016a the purpose of which is operate the dynam ics of a small scaled mini-helicopter UAV and another is Wire shark Network Packet Analyzer 2.2.5,used to analyze all the incoming and outgoing packets to the local host controller.PC2 which is acting as cloud host also operates MATLAB-2016a and holding MPC optimization algorithm for controlling the mini-helicopter.Whenever local hostneeds the guidance from cloud host its ends its desired encrypted problem valuesas function arguments to cloud host using TCP/IP Communication protocol,on the other end the cloud host computes the solution according to the algorithm written and sends back the solution to the local hosts.The local hosts then optimize the dynamics of the UAV according to the solution received.PC3 to PC6 aregiven the tasks of zombies.They are operating python scripts for launching DDoS flood attack on the IP address of local host.Every single script has power to send m ore than 20,000 UDP or TCP request packets per sam ple time to the IP address of local host,with the aim to suppress processor,memory and bandwidth in order to degrade the performance.

    Fig.5 Network layout for our simulation experiment.

    6.2 Results analysis

    First of all,we simulated only in local and cloud hosts and defined their“normal traffic and threshold matrix”from the stream of data flow taken by Wireshark Network Packet Analyzer 2.2.5.We used(12)and features given in Table 2 for computing threshold matrix T.Then we started the simulation of local host and cloud host without launching DDoS attack.Fig.6 shows the NCS performance when there is no DDoS attack,while keeping the disturbance factor wsm(k)=0.5.The red color plot is the real path of UAV and the blue color is the reference path.The plot indicates that the system is stable and operate normal under the cloud mode with the satisfied condition of Rerror<RTh.In the next step we simulated the cloud and local hosts along with the zombie computers to observe the effect of DDoS attack on the NCS.The zombie computers which flood a huge amount of useless packets at k=40 on the IP of local host with the Inpu tBuあersize=5MB.We observed more than 25,000 packets every sampling time by using Wireshark 2.2.5.Fig.7 show s the flow captured of normal traffic and Fig.8 show s the flow captured at the time of DDoS attack.

    Table 2 The feature selected for covariance matrix modeling.

    Fig.6 Performance of UAV without DDoS attack.

    Fig.7 Normal traffic flow.

    Fig.8 The DDoS traffic flow.

    The x-axis shows time span and y-axis show s the packets received atrespective time sample.On theother hand,the Det(·)function also indicated “ONES”in dif-ferent places in resultant matrix which show s that there is detection of DDoS attack.At the instance of DDoS attack the system performance is plotted in Fig.9.Those values which are lost because of DDoS,we considered the last solution received and were p lotted in Fig.9 which clearly indicate the system is highly unstable under DDoS attack.At this instance,we did not im p lement authentication and SM.Table 3 demonstrates the hazardous effect of DDoS flood attack on NCS for short duration,that how it suppresses the local controller memory and processing power.When the detection of DDoS is confirmed,in that instance the local hoststartsau thenticating every packet arriving to the system.The filtering technique discards all those packets coming from IP addresses other than cloud.Next it also verifies every packet that whether this is the exact solution coming from cloud or other one sending it.Verification is done by using KKT conditions(16,17).

    Fig.9 Performance under DDoS attack without authentication and SM.

    Table 3 The effect of DDoS attack on NCS.

    Fig.10 shows the plot of NCS when there is a lowlevel DDoS attack and we applied only Authentications without SM,where we received the lesser error in arriving solutions at k=70 with condition Rerror<RTh.Now we consider the long time flooded DDoS attack on the NCS,which aim s to fully occupy the BW and processing power.

    Fig.10 Performance of UAV under low-level DDoS attack.

    Fig.11 show s,w hen turning on the authentication and switching at k=70,UAV comes back to its reference trajectory.The huge amount of flooded DDoS messages drop down the connection between cloud and NCS.At that point the condition Rerror>RThis satisfied and NCS switches to local controller mode with the controller gain KLocalusing(19).

    The comparison of tracking error of Fig.9 and Fig.11 is plotted in Fig.12,i.e.,the error between reference and real path of the two attack cases,explaining that the UAV comes back to the reference line by SM automatically at k=77 after switching to local controller mode.Thus our simulation results greatly verify the proposed mechanism by giving an accurate detection rate and validating mitigation approach.The mechanism ensures the stability of CCS to great extant under DDoS attack.

    Fig.11 Performance of UAV under high-level DDoS attack.

    Fig.12 Comparison of tracking error of Fig.9 and Fig.11.

    7 Conclusions

    This paper presents an effective simulation model for detection and mitigation of DDoS attack on local host of CCS when they are in operation.The detection process utilizes the correlation changes among different network features provided by the sequences of network traffic taken by a passive network monitoring device.In ma thematic al terms,the detection process indicates“one”for the significant difference between the covariance matrices of threshold and difference matrix.Our simulation results show 100%detection rate for DDoS flood attack.To drop unknown data packets from inter net we develop filtering and to ensure the data integrity for arriving data,we developed a verification mechanism.For better stability case when there is no data available from the cloud because of DDoS attack,we build a local control mechanism by introducing SM.We tested the proposed mechanism by simulating the dynamic of UAV in Matlab-2016a.Our results show the proposed mechanism significantly stabilize the local host control system under DDoS attack.The future work for the proposed architecture is to apply the proposed mechanism to a physical application of CCS.

    [1]Y.Xia.Cloud control system.IEEE/CAA of Journal of Automatic a Sinica,2015,2(2):134–142.

    [2]Y.Xia,M.Y.Fu,G.P.Liu.Analysis and Synthesis of Networked Control System s.Berlin:Springer,2011.

    [3]Z.Xu,Q.Zhu.Secure and resilient control design for cloudenabled networked control systems.Proceedings of the 1st ACM Workshop on Cyber-Physical System s-Security and/or PrivaCy,Denver:ACM,2015:31–42.

    [4]L.Turnbull,B.Samanta.Cloud robotics:Formation control of a m ulti robot system utilizing cloud infrastructure.Proceedings of IEEE Southeast Con,Jacksonville:IEEE,2013:362–365.

    [5]R.Arumugam,V.Enti,L.Bingbing,et al.A cloud computing framework for service robots.IEEE International Conference on Robotics and Automation,Anchorage:IEEE,2010:3084–3089.

    [6] B.Kehoe,S.Patil,P.Abbeel,et al.A survey of research on cloud robotics and automation.IEEE Transaction on Automation Science and Engineering,2015,12(2):398–409.

    [7] X.Lei,X.Liao,T.Huang,et al.Outsourcing large matrix inversion computation to a public cloud.IEEE Transactions on Cloud Computing,2013,1(1):1–87.

    [8] J.Wan,S.Tang,H.Yan,et al.Cloud robotics:current status and open issues.IEEE Access,2016,4:2797–2807.

    [9]M.Long,C.Wu,J.Hung.Denial of service attacks on net work based control systems:impact and mitigation.IEEE Transactions on Industrial Informatics,2005,1(2):85–96.

    [10]P.Srikantha,D.Kundur.Denial of service attacks and mitigation for stability in cyber-enabled power grid.IEEE Power&Energy Society Innovative Sm art Grid Technologies Conference,Washington,D.C.:IEEE,2015.

    [11]H.Beitollahi,G.Deconinck.A dependable architecture to mitigate distributed denial of service attacks on network-based control systems.International Journal of Critical Infrastructure Protection,2011,4(3):107–123.

    [12]J.Wu,L.Zhang,T.Chen.Model predictive control for networked control system s.International Journal of Robust and Nonlinear Control,2009,19(9):1016–1035.

    [13]P.Varutti,B.Kern,T.Faulwasser,et al.Event-based model predictive control for networked control system s.Proceedings of the 48th IEEE Conference on Decision and Control Held Jointly with the 28th Chinese Control Conference,Shanghai:IEEE,2009:567–572.

    [14]S.Liu,P.X.Liu,X.Wang.H∞control of networked control system s with stochastic m easurem ent losses.IEEE International Conference on Information and Automation,Ningbo:IEEE,2016:1691–1696.

    [15]A.Cetinkaya,H.Ishii,T.Hayakawa.Enhanced stability analysis for networked control system s under random and malicious packet losses.IEEE 55th Conference on Decision and Control,Las Vegas:IEEE,2016:2721–2726.

    [16]Y.Xia.From networked control systems to cloud control system s.Proceeding of the 31th Chinese Control Conference,Hefei:IEEE,2012:5878–5883.

    [17]Y.Xia,Y.L.Gao,L.P.Yan,et al.Recent progress in networked control system s:a survey.International Journal of Automation and Computing,2015,12(4):343–367.

    [18]J.Kuffner.Cloud-enabled humanoid robots.IEEE-RAS International Conference on Hum anoid Robotics,Nashville,U.S.A.,2010.

    [19]B.Bitzer,T.Kleesuwan.Cloud-based smart grid monitoring and controlling system.50th International Universities Power Engineering Conference,England:IEEE,2015:DOI 10.1109/UPEC.2015.7339938.

    [20]S.Yu.Distributed Denial of Service Attack and Defense.Dordrecht:Springer,2013.

    [21]B.Stone-Gross,M.Cova,L.Cavallaro,et al.Your botnet is my botnet:Analysis of a botnet takeover.Proceedings of the 16th ACM Conference on Computer and Communications Security,Chicago:ACM,2009:635–647.

    [22]K.Tsui.Tutorial–Virus(Malicious Agent).Canada:University of Calgary,2001.

    [23]J.S.Kim,T.W.Yoon,A.Jadbabaie,et al.Input-to-state stabilizing MPC for neutrally stable linear systems subject to input constraints.Proceedings of the 43rd IEEE Conference on Decision and Control,Bahamas:IEEE,2004:5041–5046.

    [24]X.Lei,X.Liao,T.Huang,et al.Cloud computing service:the case of large matrix determinant computation.IEEE Transactions on Services Computing,2015,8(5):688–700.

    [25]D.S.Yeung,S.Jin,X.Wang.Covariance-matrix modeling and detecting various flooding attacks.IEEE Transactions On System s,Man,and Cybernetics–Part A:Systems&Hum ans,2007,37(2):157–169.

    [26]T.Basar,P.Bernhard.H∞Optimal Control and Related Minim ax Design Problems:A Dynamic Game Approach.Basel:Birkh?user,2008.

    [27]G.Cai,B.M.Chen,X.Dong,et al.Design and implementation of a robust and nonlinear flight control system for an unmanned helicopter.Mechatronics,2011,21(5):803–820.

    国内毛片毛片毛片毛片毛片| 熟女少妇亚洲综合色aaa.| 在线国产一区二区在线| 日韩人妻高清精品专区| 亚洲熟妇熟女久久| 欧美日韩福利视频一区二区| 欧美最黄视频在线播放免费| 精品一区二区三区视频在线观看免费| 婷婷六月久久综合丁香| 国产成人精品久久二区二区91| 成年人黄色毛片网站| 亚洲国产中文字幕在线视频| 亚洲国产精品合色在线| 国内揄拍国产精品人妻在线| 51午夜福利影视在线观看| 亚洲人成电影免费在线| 少妇的逼水好多| 成人av一区二区三区在线看| 丰满人妻一区二区三区视频av | 久久精品综合一区二区三区| 在线观看日韩欧美| 少妇的逼水好多| 999久久久国产精品视频| 国产高清视频在线观看网站| 99在线视频只有这里精品首页| 最近最新中文字幕大全电影3| 一个人看的www免费观看视频| 国产一区在线观看成人免费| 久久久久久久精品吃奶| svipshipincom国产片| 成人国产综合亚洲| 久久这里只有精品中国| 久久久久国内视频| 淫妇啪啪啪对白视频| 久久香蕉精品热| 婷婷六月久久综合丁香| 午夜福利视频1000在线观看| 国产探花在线观看一区二区| 身体一侧抽搐| 亚洲无线在线观看| 国产精品美女特级片免费视频播放器 | 又粗又爽又猛毛片免费看| 国产av不卡久久| 真人一进一出gif抽搐免费| 国产精品一区二区免费欧美| 每晚都被弄得嗷嗷叫到高潮| 中文字幕人妻丝袜一区二区| 操出白浆在线播放| 91九色精品人成在线观看| 午夜福利在线在线| 国产一区二区三区在线臀色熟女| 国产精品亚洲av一区麻豆| 欧美日韩国产亚洲二区| 男人舔女人下体高潮全视频| 国产亚洲av嫩草精品影院| 午夜久久久久精精品| 麻豆成人av在线观看| 国产免费av片在线观看野外av| 母亲3免费完整高清在线观看| 亚洲精品乱码久久久v下载方式 | 亚洲人成伊人成综合网2020| 国产精品亚洲美女久久久| 最好的美女福利视频网| 欧美zozozo另类| 成人三级做爰电影| 在线观看免费视频日本深夜| 久久久水蜜桃国产精品网| 丝袜人妻中文字幕| 脱女人内裤的视频| av中文乱码字幕在线| 最近视频中文字幕2019在线8| 精品一区二区三区四区五区乱码| 亚洲最大成人中文| 色综合亚洲欧美另类图片| 精品久久久久久久末码| 精品久久久久久久久久久久久| 亚洲人成网站在线播放欧美日韩| 日韩三级视频一区二区三区| 18禁黄网站禁片午夜丰满| 真人做人爱边吃奶动态| 少妇人妻一区二区三区视频| 日本a在线网址| 人妻久久中文字幕网| 欧美不卡视频在线免费观看| 88av欧美| av片东京热男人的天堂| 国产精品1区2区在线观看.| 日韩欧美一区二区三区在线观看| 美女cb高潮喷水在线观看 | 亚洲狠狠婷婷综合久久图片| 色视频www国产| 搞女人的毛片| 男女做爰动态图高潮gif福利片| 精品久久久久久久末码| 99久久精品一区二区三区| 好男人电影高清在线观看| 九九热线精品视视频播放| 99久久精品国产亚洲精品| 亚洲一区二区三区不卡视频| 丰满的人妻完整版| 国产成人影院久久av| 日韩大尺度精品在线看网址| 最好的美女福利视频网| 亚洲欧美日韩卡通动漫| 色尼玛亚洲综合影院| 熟女电影av网| 午夜福利免费观看在线| 亚洲第一欧美日韩一区二区三区| 国产视频一区二区在线看| 美女高潮喷水抽搐中文字幕| 国产视频内射| 又紧又爽又黄一区二区| 国产精品日韩av在线免费观看| 免费在线观看亚洲国产| 在线观看66精品国产| 免费电影在线观看免费观看| 亚洲人成伊人成综合网2020| 一个人看的www免费观看视频| 丰满人妻一区二区三区视频av | www国产在线视频色| 欧美不卡视频在线免费观看| 美女高潮喷水抽搐中文字幕| 亚洲一区高清亚洲精品| 婷婷精品国产亚洲av| 免费电影在线观看免费观看| xxxwww97欧美| 国产精品一区二区三区四区免费观看 | 免费高清视频大片| 成人鲁丝片一二三区免费| 老熟妇乱子伦视频在线观看| 国产高清视频在线观看网站| 欧美一级毛片孕妇| 999久久久精品免费观看国产| 国产一区二区激情短视频| 国产视频内射| 亚洲熟女毛片儿| 亚洲熟妇熟女久久| 熟女少妇亚洲综合色aaa.| 亚洲国产高清在线一区二区三| www.999成人在线观看| 狂野欧美白嫩少妇大欣赏| 香蕉久久夜色| 欧美黄色片欧美黄色片| 免费看日本二区| 久久国产精品影院| 亚洲国产欧美人成| 色尼玛亚洲综合影院| 黄色 视频免费看| 亚洲性夜色夜夜综合| 婷婷丁香在线五月| 一进一出抽搐gif免费好疼| 国内毛片毛片毛片毛片毛片| 淫妇啪啪啪对白视频| av天堂在线播放| 啪啪无遮挡十八禁网站| 成人精品一区二区免费| 亚洲中文日韩欧美视频| 人人妻,人人澡人人爽秒播| 黄频高清免费视频| 怎么达到女性高潮| 国产三级在线视频| 后天国语完整版免费观看| 中文字幕高清在线视频| 国产又色又爽无遮挡免费看| 日韩有码中文字幕| 国产精品1区2区在线观看.| 亚洲精品美女久久久久99蜜臀| 国产成人一区二区三区免费视频网站| 欧美不卡视频在线免费观看| 久久久久久国产a免费观看| 成年女人毛片免费观看观看9| 国产精品98久久久久久宅男小说| 综合色av麻豆| 最近最新中文字幕大全电影3| 神马国产精品三级电影在线观看| cao死你这个sao货| 天堂av国产一区二区熟女人妻| 精华霜和精华液先用哪个| 这个男人来自地球电影免费观看| 国产伦一二天堂av在线观看| www.999成人在线观看| 国产97色在线日韩免费| 亚洲中文字幕一区二区三区有码在线看 | 黄色片一级片一级黄色片| 熟妇人妻久久中文字幕3abv| 欧美黄色片欧美黄色片| 91麻豆av在线| 日本免费一区二区三区高清不卡| 中亚洲国语对白在线视频| 啦啦啦观看免费观看视频高清| 午夜福利18| 一边摸一边抽搐一进一小说| 国产免费男女视频| 亚洲av成人av| 成人18禁在线播放| 久久久国产欧美日韩av| 亚洲五月婷婷丁香| 日韩欧美在线乱码| 久久久久久久久久黄片| 精品午夜福利视频在线观看一区| 亚洲专区中文字幕在线| 中国美女看黄片| 成人精品一区二区免费| 久久久久久久久久黄片| 美女扒开内裤让男人捅视频| 人人妻人人澡欧美一区二区| 亚洲色图 男人天堂 中文字幕| 欧美绝顶高潮抽搐喷水| 欧美一区二区国产精品久久精品| 国产精品 欧美亚洲| 日韩免费av在线播放| 日韩av在线大香蕉| 久久久久久久久中文| 亚洲国产看品久久| e午夜精品久久久久久久| 在线观看66精品国产| 淫秽高清视频在线观看| 国内精品久久久久精免费| 91av网一区二区| 午夜精品在线福利| 亚洲精品一卡2卡三卡4卡5卡| 女生性感内裤真人,穿戴方法视频| 99久国产av精品| 99久久久亚洲精品蜜臀av| 国产精品自产拍在线观看55亚洲| 夜夜躁狠狠躁天天躁| 97人妻精品一区二区三区麻豆| 男人的好看免费观看在线视频| 中文资源天堂在线| 国产三级黄色录像| 国产在线精品亚洲第一网站| 日本 av在线| 国产麻豆成人av免费视频| 欧美日韩精品网址| 日本免费a在线| 看免费av毛片| 国产精品,欧美在线| 美女高潮的动态| 动漫黄色视频在线观看| 嫩草影院入口| 国产精品乱码一区二三区的特点| 最近视频中文字幕2019在线8| 国产高清三级在线| 国产高清激情床上av| 国产成人一区二区三区免费视频网站| 麻豆久久精品国产亚洲av| 91在线精品国自产拍蜜月 | 日韩免费av在线播放| 久久天躁狠狠躁夜夜2o2o| 午夜日韩欧美国产| 亚洲熟妇熟女久久| 国产在线精品亚洲第一网站| 一a级毛片在线观看| 午夜激情福利司机影院| 午夜视频精品福利| 日本一二三区视频观看| 老司机在亚洲福利影院| а√天堂www在线а√下载| 国产1区2区3区精品| 国产免费av片在线观看野外av| 桃色一区二区三区在线观看| 亚洲av成人不卡在线观看播放网| 男插女下体视频免费在线播放| 日本熟妇午夜| 国产精品爽爽va在线观看网站| 一本精品99久久精品77| 少妇丰满av| 免费在线观看亚洲国产| 成人国产一区最新在线观看| 十八禁人妻一区二区| 一个人看视频在线观看www免费 | 国产精品亚洲av一区麻豆| www日本黄色视频网| 高清毛片免费观看视频网站| 欧美日韩精品网址| 亚洲av熟女| 中文字幕高清在线视频| 麻豆国产97在线/欧美| 欧美极品一区二区三区四区| 精品久久久久久,| 亚洲人成电影免费在线| 黄色 视频免费看| 欧美xxxx黑人xx丫x性爽| 欧美乱色亚洲激情| 一个人免费在线观看的高清视频| 一本精品99久久精品77| 国产免费av片在线观看野外av| 女人被狂操c到高潮| 亚洲专区中文字幕在线| av女优亚洲男人天堂 | 一进一出抽搐动态| 1000部很黄的大片| 国产亚洲av嫩草精品影院| 国产黄片美女视频| 亚洲aⅴ乱码一区二区在线播放| 国产亚洲精品综合一区在线观看| 国产一区二区在线av高清观看| 亚洲第一电影网av| 热99在线观看视频| 国产激情久久老熟女| 国产三级在线视频| 国产亚洲欧美98| 99久久久亚洲精品蜜臀av| 国产成人影院久久av| 老熟妇乱子伦视频在线观看| 久久久久久久精品吃奶| 亚洲国产精品合色在线| 最近最新中文字幕大全免费视频| 免费在线观看视频国产中文字幕亚洲| 欧美性猛交╳xxx乱大交人| 欧美最黄视频在线播放免费| 久久精品影院6| 亚洲天堂国产精品一区在线| 国产私拍福利视频在线观看| 国产综合懂色| 美女黄网站色视频| 久久人妻av系列| av欧美777| 国产单亲对白刺激| 丁香欧美五月| 久久草成人影院| 又粗又爽又猛毛片免费看| 欧美色视频一区免费| 久久香蕉精品热| 中亚洲国语对白在线视频| 岛国在线观看网站| 免费人成视频x8x8入口观看| 岛国在线观看网站| 免费人成视频x8x8入口观看| 欧美日韩精品网址| 中亚洲国语对白在线视频| 久久久久国产精品人妻aⅴ院| 俄罗斯特黄特色一大片| 国产熟女xx| 欧美日韩中文字幕国产精品一区二区三区| 国产av麻豆久久久久久久| 日本精品一区二区三区蜜桃| 最近最新中文字幕大全电影3| 国产免费av片在线观看野外av| 亚洲avbb在线观看| 国产又色又爽无遮挡免费看| 国产精品久久电影中文字幕| 九九久久精品国产亚洲av麻豆 | 亚洲精品一区av在线观看| 久99久视频精品免费| 我的老师免费观看完整版| 国产成人影院久久av| 在线观看66精品国产| 天天躁日日操中文字幕| 亚洲精品一卡2卡三卡4卡5卡| 岛国在线免费视频观看| 曰老女人黄片| 色精品久久人妻99蜜桃| 久久香蕉精品热| 丝袜人妻中文字幕| 国产亚洲精品久久久久久毛片| 日本 欧美在线| 国产乱人伦免费视频| 亚洲国产精品成人综合色| 岛国在线观看网站| a级毛片在线看网站| 亚洲午夜精品一区,二区,三区| 狠狠狠狠99中文字幕| 在线十欧美十亚洲十日本专区| 嫩草影院精品99| 久久久久久久久中文| 90打野战视频偷拍视频| 欧美乱码精品一区二区三区| 国产伦人伦偷精品视频| 国产毛片a区久久久久| 欧美zozozo另类| 曰老女人黄片| 丝袜人妻中文字幕| 欧美日韩黄片免| 久久性视频一级片| 日韩欧美 国产精品| 最近在线观看免费完整版| 国产一区二区三区视频了| 青草久久国产| 1000部很黄的大片| 三级毛片av免费| 久久欧美精品欧美久久欧美| 色视频www国产| 日韩欧美精品v在线| 性欧美人与动物交配| 在线视频色国产色| 色av中文字幕| 久久99热这里只有精品18| 久久伊人香网站| 欧美午夜高清在线| 真实男女啪啪啪动态图| 长腿黑丝高跟| 人人妻人人看人人澡| 舔av片在线| 亚洲专区字幕在线| cao死你这个sao货| 久久香蕉精品热| 国产亚洲精品久久久com| 亚洲 欧美 日韩 在线 免费| 后天国语完整版免费观看| 国产高潮美女av| 国产成人av教育| 精品人妻1区二区| 美女高潮的动态| 18禁黄网站禁片免费观看直播| 成年免费大片在线观看| 精华霜和精华液先用哪个| 精品99又大又爽又粗少妇毛片 | 一级毛片精品| 欧美午夜高清在线| 国产探花在线观看一区二区| 噜噜噜噜噜久久久久久91| 久久精品国产综合久久久| 国内毛片毛片毛片毛片毛片| 白带黄色成豆腐渣| 99riav亚洲国产免费| 动漫黄色视频在线观看| 国产麻豆成人av免费视频| 日本五十路高清| 性欧美人与动物交配| 国产不卡一卡二| 99久久成人亚洲精品观看| 久久久久久久久久黄片| 成人精品一区二区免费| 男女之事视频高清在线观看| 黄色成人免费大全| 给我免费播放毛片高清在线观看| ponron亚洲| 免费在线观看亚洲国产| 午夜福利欧美成人| 真实男女啪啪啪动态图| 久久久国产精品麻豆| 好看av亚洲va欧美ⅴa在| 两个人视频免费观看高清| 婷婷精品国产亚洲av| 男插女下体视频免费在线播放| 两个人的视频大全免费| 熟女人妻精品中文字幕| 欧美日本亚洲视频在线播放| 欧洲精品卡2卡3卡4卡5卡区| 岛国视频午夜一区免费看| 一级毛片精品| 黄频高清免费视频| 女同久久另类99精品国产91| 波多野结衣高清作品| 淫妇啪啪啪对白视频| 成年女人永久免费观看视频| 国产精品99久久久久久久久| 男女视频在线观看网站免费| 精品国产亚洲在线| 国内精品久久久久久久电影| 啦啦啦免费观看视频1| 丰满人妻熟妇乱又伦精品不卡| 99精品欧美一区二区三区四区| 国产激情欧美一区二区| 午夜亚洲福利在线播放| 三级男女做爰猛烈吃奶摸视频| 最新在线观看一区二区三区| 亚洲美女视频黄频| 国产探花在线观看一区二区| 我要搜黄色片| 亚洲专区国产一区二区| 亚洲欧美日韩高清专用| 最好的美女福利视频网| 国产精品永久免费网站| 久久香蕉国产精品| 亚洲va日本ⅴa欧美va伊人久久| 天天躁日日操中文字幕| 99久久久亚洲精品蜜臀av| e午夜精品久久久久久久| 午夜a级毛片| 91老司机精品| 国内毛片毛片毛片毛片毛片| 又紧又爽又黄一区二区| 99久久国产精品久久久| 在线观看一区二区三区| 天堂网av新在线| 亚洲性夜色夜夜综合| 成年版毛片免费区| 最近在线观看免费完整版| 国产野战对白在线观看| 人妻久久中文字幕网| 一级a爱片免费观看的视频| 中文字幕最新亚洲高清| 综合色av麻豆| 国产精品98久久久久久宅男小说| 成人性生交大片免费视频hd| 搡老岳熟女国产| 午夜成年电影在线免费观看| 亚洲熟妇中文字幕五十中出| 成人欧美大片| 91在线精品国自产拍蜜月 | 99精品欧美一区二区三区四区| 在线国产一区二区在线| 嫩草影院入口| 亚洲成人久久性| 少妇的丰满在线观看| 国产蜜桃级精品一区二区三区| 人妻丰满熟妇av一区二区三区| 免费大片18禁| 午夜两性在线视频| e午夜精品久久久久久久| 色综合亚洲欧美另类图片| 国产激情偷乱视频一区二区| 日韩av在线大香蕉| 老熟妇仑乱视频hdxx| 欧美一级毛片孕妇| www.999成人在线观看| 久久精品亚洲精品国产色婷小说| 桃红色精品国产亚洲av| 日本五十路高清| 国产激情久久老熟女| 日韩三级视频一区二区三区| 岛国在线观看网站| 亚洲国产色片| 国产一区在线观看成人免费| 精品国内亚洲2022精品成人| 日日干狠狠操夜夜爽| 国产一级毛片七仙女欲春2| 国产69精品久久久久777片 | 9191精品国产免费久久| a级毛片在线看网站| 男人舔女人的私密视频| 亚洲国产中文字幕在线视频| 国产精品日韩av在线免费观看| 国产精品一区二区三区四区免费观看 | 99久久精品国产亚洲精品| 国产免费av片在线观看野外av| 真人做人爱边吃奶动态| 中亚洲国语对白在线视频| 久久精品人妻少妇| 国产精品永久免费网站| 噜噜噜噜噜久久久久久91| 在线观看66精品国产| 午夜激情福利司机影院| 精品国产美女av久久久久小说| 亚洲国产欧美网| 色精品久久人妻99蜜桃| 神马国产精品三级电影在线观看| 中文字幕最新亚洲高清| 免费看美女性在线毛片视频| 精品国产超薄肉色丝袜足j| 久久久国产成人精品二区| 97超视频在线观看视频| 欧美绝顶高潮抽搐喷水| 99在线视频只有这里精品首页| 中文字幕人成人乱码亚洲影| 日日摸夜夜添夜夜添小说| 夜夜爽天天搞| 国产精品影院久久| 最新美女视频免费是黄的| 日韩欧美免费精品| 亚洲一区二区三区色噜噜| 特大巨黑吊av在线直播| 亚洲国产欧美人成| 亚洲专区国产一区二区| e午夜精品久久久久久久| 岛国视频午夜一区免费看| 欧美绝顶高潮抽搐喷水| 麻豆成人午夜福利视频| 国产高清激情床上av| 在线国产一区二区在线| 黄片大片在线免费观看| 美女大奶头视频| 日韩大尺度精品在线看网址| 亚洲黑人精品在线| 国产精品久久久久久亚洲av鲁大| 国产又黄又爽又无遮挡在线| 国内毛片毛片毛片毛片毛片| 三级国产精品欧美在线观看 | 长腿黑丝高跟| 成年版毛片免费区| 久久这里只有精品19| 丰满的人妻完整版| 国产伦一二天堂av在线观看| 国产欧美日韩一区二区精品| 国产主播在线观看一区二区| netflix在线观看网站| 一本久久中文字幕| 亚洲成人中文字幕在线播放| 成人一区二区视频在线观看| 国产精品久久视频播放| 亚洲美女黄片视频| 精品国内亚洲2022精品成人| 色精品久久人妻99蜜桃| 村上凉子中文字幕在线| 国产探花在线观看一区二区| 亚洲精华国产精华精| 免费看a级黄色片| 午夜精品一区二区三区免费看| 欧美激情在线99| 此物有八面人人有两片| 最近最新中文字幕大全电影3| 亚洲欧美一区二区三区黑人| 精品电影一区二区在线| 午夜久久久久精精品| 日本a在线网址| 又粗又爽又猛毛片免费看| 观看免费一级毛片| 国产高清有码在线观看视频| 男人舔奶头视频| xxx96com| 欧美激情在线99| av天堂在线播放| 日韩大尺度精品在线看网址| 中亚洲国语对白在线视频| 色在线成人网| 精品国内亚洲2022精品成人| 麻豆av在线久日| 97人妻精品一区二区三区麻豆| 亚洲av中文字字幕乱码综合| 丝袜人妻中文字幕| 国产真人三级小视频在线观看| 看黄色毛片网站| 久久久色成人|