Skip to main content

Detection of Abnormal Nodes in Clustered Control Systems Based on Multiagent Group Prominence Analyses

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1368 Accesses

Abstract

In now networked control systems, some nodes may be invaded and become abnormal which may tamper with the execution of tasks; especially, in clustered networked control systems, the nodes are hierarchical and hybrid, thus the detection of abnormal nodes is difficult. To deal with such problem, this paper uses the multiagent method to model and analyze the clustered control systems, where the cluster stations and control units are modeled as the coalition systems of hybrid agents. Based on the multiagent model, then the paper presents the concept of group prominence to measure the strategy characteristics of cluster stations and control units; finally, a model for detecting abnormal nodes based on multiagent group prominence analyses is presented, which can effectively improve the consistency of the system.

This work was supported by the National Natural Science Foundation of China (No. 61073189).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Veillette, R.J.: Design of Reliable Control Systems. IEEE Transactions on Automatic Control 37(3), 290–304 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  2. Fjuita, S., Lesser, V.R.: Centralized Task Distribution in The Presence of Uncertainty and Time Deadlines. In: Proceedings of the Second International Conference on Multiagent Systems (ICMAS 1996), Kyoto, Japan, December 10-13, pp. 87–94 (1996)

    Google Scholar 

  3. Lian, F.-L.: Network Design Consideration for Distributed Control Systems. IEEE Transactions on Control Systems Technology 10(2), 297–307 (2002)

    Article  Google Scholar 

  4. Gupta, R.A., Chow, M.-Y.: Networked Control Systems: Overview and Research Trends. IEEE Transactions on Industrial Electronics 57(7), 2527–2535 (2010)

    Article  Google Scholar 

  5. Wei, Z., Branicky, M.S., Phillips, S.M.: Stability of Networked Control Systems. IEEE Control Systems 21(1), 84–99 (2001)

    Article  Google Scholar 

  6. Jones, A.T., McLean, C.R.: A Proposed Hierarchical Control Model for Automated Manufacturing Systems. Journal of Manufacturing Systems 5(1), 15–25 (1986)

    Article  Google Scholar 

  7. Younis, O., Fahmy, S.: HEED: A Hybrid, Energy-Efficient Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Transactions on Mobile Computing 3(4), 366–379 (2004)

    Article  Google Scholar 

  8. Hodge, V., Austin, J.: A Survey of Outlier Detection Methodologies. Artificial Intelligence Review 22(2), 85–126 (2004)

    Article  MATH  Google Scholar 

  9. Liao, Y., RaoVemuri, V.: Use of K-Nearest Neighbor Classifier for Intrusion Detection. Computers & Security 21(5), 439–448 (2002)

    Article  Google Scholar 

  10. Jennings, N.R.: Controlling Cooperative Problem Solving in Industrial Multi-Agent Systems Using Joint Intentions. Artificial Intelligence 75(2), 195–240 (1995)

    Article  Google Scholar 

  11. Brennan, R.W., Fletcher, M., Norrie, D.H.: An Agent-Based Approach to Reconfiguration of Real-Time Distributed Control Systems. IEEE Transactions on Robotics and Automation 18(4), 444–451 (2002)

    Article  Google Scholar 

  12. Creery, A., Byres, E.J.: Industrial Cybersecurity for Power System and SCADA Networks-Be Secure. IEEE Industry Applications Magazine 13(4), 49–55 (2007)

    Article  Google Scholar 

  13. Tsang, C.-H., Kwong, S.: Multi-Agent Intrusion Detection System in Industrial Network Using Ant Colony Clustering Approach and UnsupervisedFeature Extraction. In: Proceedings of the2005 IEEE International Conference on Industrial Technology (ICIT 2005), Hong Kong, December 14-17, pp. 51–56 (2005)

    Google Scholar 

  14. Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A Multi-Agent Based System for Intrusion Detection. IEEE Potential 22(4), 28–31 (2003)

    Article  Google Scholar 

  15. Jiang, J.C., Xia, X.J.: Prominence Convergence in theCollective Synchronization of Situated Multi-Agents. Information Processing Letters 109(5), 278–285 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  16. Jiang, J.C., Xia, Z.Y.: Cluster Partition-Based Communication of Multiagents: The Model and Analyses. Advances in Engineering Software 42(10), 807–814 (2011)

    Article  Google Scholar 

  17. Jiang, Y., Hu, J., Lin, D.: Decision Making of Networked MultiagentSystems for Interaction Structures. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 41(6), 1107–1121 (2011)

    Article  Google Scholar 

  18. Cao, L., Zhang, C., Zhou, M.C.: Engineering Open Complex Agent Systems: A Case Study. IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews 38(4), 483–496 (2008)

    Article  Google Scholar 

  19. Ohtsuki, H., Hauert, C., Lieberman, E., Nowak, M.A.: A Simple Rule for The Evolution of Cooperation on Graphs and Social Networks. Nature 441, 502–505 (2006)

    Article  Google Scholar 

  20. Jiang, Y., Jiang, J.C.: A Multi-Agent Coordination Model for The Variation of Underlying Network Topology. Expert Systems with Applications 29(2), 372–382 (2005)

    Article  Google Scholar 

  21. Jiang, J.C., Lai, D.R., Zhang, Y.G., Lei, J.S.: A Tag-Based Solution for Data Sensing Conflicts in Multiple Sensing Agent Systems. Advances in Engineering Software 47(1), 170–177 (2012)

    Article  Google Scholar 

  22. Jiang, Y., Hu, J.: Favor-based decision: A novel approach to modeling the strategy diffusion in causal multiagent societies. Expert Systems with Applications 38(4), 2974–2983 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Jiang, J., Lei, J., Liu, W. (2012). Detection of Abnormal Nodes in Clustered Control Systems Based on Multiagent Group Prominence Analyses. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics