Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = petri net-based bayesian network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 534 KB  
Article
Research on the Security of IPv6 Communication Based on Petri Net under IoT
by Yu Han, Liumei Zhang, Yichuan Wang, Xi Deng, Zhendong Gu and Xiaohui Zhang
Sensors 2023, 23(11), 5192; https://doi.org/10.3390/s23115192 - 30 May 2023
Cited by 6 | Viewed by 4120
Abstract
The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, [...] Read more.
The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes. Full article
(This article belongs to the Special Issue Hardware and Chip Security in Cyber Physical System)
Show Figures

Figure 1

24 pages, 5704 KB  
Article
PN-BBN: A Petri Net-Based Bayesian Network for Anomalous Behavior Detection
by Ke Lu, Xianwen Fang and Na Fang
Mathematics 2022, 10(20), 3790; https://doi.org/10.3390/math10203790 - 14 Oct 2022
Cited by 8 | Viewed by 2806
Abstract
Business process anomalous behavior detection reveals unexpected cases from event logs to ensure the trusted operation of information systems. Anomaly behavior is mainly identified through a log-to-model alignment analysis or numerical outlier detection. However, both approaches ignore the influence of probability distributions or [...] Read more.
Business process anomalous behavior detection reveals unexpected cases from event logs to ensure the trusted operation of information systems. Anomaly behavior is mainly identified through a log-to-model alignment analysis or numerical outlier detection. However, both approaches ignore the influence of probability distributions or activity relationships in process activities. Based on this concern, this paper incorporates the behavioral relationships characterized by the process model and the joint probability distribution of nodes related to suspected anomalous behaviors. Moreover, a Petri Net-Based Bayesian Network (PN-BBN) is proposed to detect anomalous behaviors based on the probabilistic inference of behavioral contexts. First, the process model is filtered based on the process structure of the process activities to identify the key regions where the suspected anomalous behaviors are located. Then, the behavioral profile of the activity is used to prune it to position the ineluctable paths that trigger these activities. Further, the model is used as the architecture for parameter learning to construct the PN-BBN. Based on this, anomaly scores are inferred based on the joint probabilities of activities related to suspected anomalous behaviors for anomaly detection under the constraints of control flow and probability distributions. Finally, PN-BBN is implemented based on the open-source frameworks PM4PY and PMGPY and evaluated from multiple metrics with synthetic and real process data. The experimental results demonstrate that PN-BBN effectively identifies anomalous process behaviors and improves the reliability of information systems. Full article
(This article belongs to the Topic Machine and Deep Learning)
Show Figures

Figure 1

15 pages, 423 KB  
Communication
Safety Control Architecture for Ventricular Assist Devices
by André C. M. Cavalheiro, Diolino J. Santos Filho, Jônatas C. Dias, Aron J. P. Andrade, José R. Cardoso and Marcos S. G. Tsuzuki
Machines 2022, 10(1), 5; https://doi.org/10.3390/machines10010005 - 22 Dec 2021
Cited by 1 | Viewed by 3085
Abstract
In patients with severe heart disease, the implantation of a ventricular assist device (VAD) may be necessary, especially in patients with an indication for heart transplantation. For this, the Institute Dante Pazzanese of Cardiology (IDPC) has developed an implantable centrifugal blood pump that [...] Read more.
In patients with severe heart disease, the implantation of a ventricular assist device (VAD) may be necessary, especially in patients with an indication for heart transplantation. For this, the Institute Dante Pazzanese of Cardiology (IDPC) has developed an implantable centrifugal blood pump that will be able to help a diseased human heart to maintain physiological blood flow and pressure. This device will be used as a totally or partially implantable VAD. Therefore, performance assurance and correct specification of the VAD are important factors in achieving a safe interaction between the device and the patient’s behavior or condition. Even with reliable devices, some failures may occur if the pumping control does not keep up with changes in the patient’s behavior or condition. If the VAD control system has no fault tolerance and no system dynamic adaptation that occurs according to changes in the patient’s cardiovascular system, a number of limitations can be observed in the results and effectiveness of these devices, especially in patients with acute comorbidities. This work proposes the application of a mechatronic approach to this class of devices based on advanced control, instrumentation, and automation techniques to define a method to develop a hierarchical supervisory control system capable of dynamically, automatically, and safely VAD control. For this methodology, concepts based on Bayesian networks (BN) were used to diagnose the patient’s cardiovascular system conditions, Petri nets (PN) to generate the VAD control algorithm, and safety instrumented systems to ensure the safety of the VAD system. Full article
(This article belongs to the Special Issue Industrial Applications: New Solutions for the New Era)
Show Figures

Figure 1

Back to TopTop