Threat monitoring method of swarm intelligence system suitable for small unmanned aerial vehicle cluster

A small unmanned aerial vehicle and swarm intelligence technology, applied in the field of network security, which can solve the problems of high load, few detection means, and low precision.

Inactive Publication Date: 2020-04-21
SOUTHWEST CHINA RES INST OF ELECTRONICS EQUIP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a group intelligence system threat monitoring method suitable for small UAV clusters in view of the problems of existing detection methods with few dimensions, low precision and high load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat monitoring method of swarm intelligence system suitable for small unmanned aerial vehicle cluster
  • Threat monitoring method of swarm intelligence system suitable for small unmanned aerial vehicle cluster
  • Threat monitoring method of swarm intelligence system suitable for small unmanned aerial vehicle cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with the accompanying drawings.

[0028] A swarm intelligence system threat monitoring method suitable for small UAV clusters. Since security events have timing and real-time characteristics, and are closely related to physical components, communication and other information, there is a causal relationship between events and states , the present invention adopts the method of run-time verification to monitor the security threat of the flight system of the UAV cluster by automatically generating a run-time monitor. The threat monitoring framework is as follows: figure 1 , monitoring methods include:

[0029] Lightweight threat data collection: This process mainly defines the security properties of the unmanned aerial system, and uses discrete time-based metric temporal logic to abstract the security properties of the unmanned aerial vehicle system. In the framework of threat data collection The light-w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, and discloses a threat monitoring method of a swarm intelligence system suitable for a small unmanned aerial vehicle cluster, which mainly comprises the following three aspects: (1) defining the security property of an unmanned aerial vehicle system to achieve lightweight threat data acquisition through abstract description and security property specification language; (2) by designing a security threat monitor and verifying an interaction mode with a Bayesian network during operation, achieving timely discovery and detection of threats such as attack behaviors and network system exception and data-driven threat identification and (3) performing global security situation assessment based on the global view. According to thescheme, light weight of threat data acquired as required is realized, and a high-quality data basis is provided for threat monitoring of a swarm intelligence system. Global perception of threat behaviors is achieved, and the problems that monitoring means are few in dimension, low in precision and high in load are solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a swarm intelligence system threat monitoring method suitable for small drone clusters. Background technique [0002] Small UAV swarms are the main research object in the research of distributed swarm intelligence. The purpose is to realize distributed cooperative coordination control among intelligent systems with relatively simple functions, and finally complete complex tasks. Therefore, at present, researches on the theory and technology of swarm intelligence are mostly carried out in China. The research on swarm intelligence information mining and decision optimization and related application research is still in its infancy in resisting security threats, and only involves the security of UAV system in cooperative control. [0003] Huazhong University of Science and Technology has studied the static consistency problem of multi-agent systems under the condition of c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/40H04W12/12H04W12/122
CPCH04W4/40H04W12/121H04W12/122
Inventor 张谦王吉唐泽宇李昊顾杰
Owner SOUTHWEST CHINA RES INST OF ELECTRONICS EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products