首页 > 最新文献

ACM Transactions on Cyber-Physical Systems (TCPS)最新文献

英文 中文
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective 海上油气行业的网络安全挑战:工业网络物理系统(ICPS)的视角
Pub Date : 2022-02-23 DOI: 10.1145/3548691
A. S. Mohammed, P. Reinecke, P. Burnap, O. Rana, Eirini Anthi
There has been significant interest within the offshore oil and gas industry to utilise Industrial Internet of Things (IIoT) and Industrial Cyber-Physical Systems (ICPS). There has also been a corresponding increase in cyberattacks targeted at oil and gas companies. Offshore oil production requires remote access to and control of large and complex hardware resources. This is achieved by integrating ICPS, Supervisory, Control and Data Acquisition (SCADA) systems, and IIoT technologies. A successful cyberattack against an oil and gas (O&G) offshore asset could have a major impact on the environment, marine ecosystem and safety of personnel. Any disruption to the world’s supply of O&G can also have an effect on oil prices and the global economy. We describe the cyberattack surface within the oil and gas industry, discussing emerging trends in the offshore sub-sector and provide a historical perspective of known cyberattacks. We also present a case study of a subsea control system architecture typically used in offshore O&G operations and highlight potential vulnerabilities affecting the components of the system. This study is the first to provide a detailed analysis of attack vectors in a subsea control system. The analysis provided can be used to understand key vulnerabilities in such systems and may be used to implement efficient mitigation methods.
海上油气行业对利用工业物联网(IIoT)和工业网络物理系统(ICPS)产生了极大的兴趣。针对石油和天然气公司的网络攻击也相应增加。海上石油生产需要远程访问和控制大型复杂的硬件资源。这是通过集成ICPS、监视、控制和数据采集(SCADA)系统以及工业物联网技术来实现的。针对油气(O&G)海上资产的成功网络攻击可能对环境、海洋生态系统和人员安全产生重大影响。全球油气供应的任何中断也可能对油价和全球经济产生影响。我们描述了石油和天然气行业的网络攻击面,讨论了海上子行业的新兴趋势,并提供了已知网络攻击的历史视角。我们还介绍了海上油气作业中常用的海底控制系统架构的案例研究,并强调了影响系统组件的潜在漏洞。该研究首次对海底控制系统中的攻击载体进行了详细分析。所提供的分析可用于了解此类系统中的关键漏洞,并可用于实施有效的缓解方法。
{"title":"Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective","authors":"A. S. Mohammed, P. Reinecke, P. Burnap, O. Rana, Eirini Anthi","doi":"10.1145/3548691","DOIUrl":"https://doi.org/10.1145/3548691","url":null,"abstract":"There has been significant interest within the offshore oil and gas industry to utilise Industrial Internet of Things (IIoT) and Industrial Cyber-Physical Systems (ICPS). There has also been a corresponding increase in cyberattacks targeted at oil and gas companies. Offshore oil production requires remote access to and control of large and complex hardware resources. This is achieved by integrating ICPS, Supervisory, Control and Data Acquisition (SCADA) systems, and IIoT technologies. A successful cyberattack against an oil and gas (O&G) offshore asset could have a major impact on the environment, marine ecosystem and safety of personnel. Any disruption to the world’s supply of O&G can also have an effect on oil prices and the global economy. We describe the cyberattack surface within the oil and gas industry, discussing emerging trends in the offshore sub-sector and provide a historical perspective of known cyberattacks. We also present a case study of a subsea control system architecture typically used in offshore O&G operations and highlight potential vulnerabilities affecting the components of the system. This study is the first to provide a detailed analysis of attack vectors in a subsea control system. The analysis provided can be used to understand key vulnerabilities in such systems and may be used to implement efficient mitigation methods.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116953256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces 基于输入-输出轨迹的仿射混合自动机辨识与验证框架
Pub Date : 2022-02-11 DOI: 10.1145/3470455
Xiaodong Yang, O. Beg, M. Kenigsberg, Taylor T. Johnson
Automata-based modeling of hybrid and cyber-physical systems (CPS) is an important formal abstraction amenable to algorithmic analysis of its dynamic behaviors, such as in verification, fault identification, and anomaly detection. However, for realistic systems, especially industrial ones, identifying hybrid automata is challenging, due in part to inferring hybrid interactions, which involves inference of both continuous behaviors, such as through classical system identification, as well as discrete behaviors, such as through automata (e.g., L*) learning. In this paper, we propose and evaluate a framework for inferring and validating models of deterministic hybrid systems with linear ordinary differential equations (ODEs) from input/output execution traces. The framework contains algorithms for the approximation of continuous dynamics in discrete modes, estimation of transition conditions, and the inference of automata mode merging. The algorithms are capable of clustering trace segments and estimating their dynamic parameters, and meanwhile, deriving guard conditions that are represented by multiple linear inequalities. Finally, the inferred model is automatically converted to the format of the original system for the validation. We demonstrate the utility of this framework by evaluating its performance in several case studies as implemented through a publicly available prototype software framework called HAutLearn and compare it with a membership-based algorithm.
基于自动机的混合网络物理系统(CPS)建模是一种重要的形式化抽象,适用于对其动态行为进行算法分析,如验证、故障识别和异常检测。然而,对于现实系统,特别是工业系统,识别混合自动机是具有挑战性的,部分原因在于推断混合相互作用,这涉及到对连续行为的推断,例如通过经典系统识别,以及离散行为,例如通过自动机(例如L*)学习。在本文中,我们提出并评估了一个从输入/输出执行轨迹推断和验证具有线性常微分方程(ode)的确定性混合系统模型的框架。该框架包含离散模式下连续动力学的逼近算法、过渡条件的估计算法和自动机模式合并的推理算法。该算法能够对轨迹段进行聚类,估计轨迹段的动态参数,同时导出由多个线性不等式表示的保护条件。最后,将推断的模型自动转换为原始系统的格式以进行验证。我们通过一个名为HAutLearn的公开可用原型软件框架在几个案例研究中评估其性能,并将其与基于成员关系的算法进行比较,从而展示了该框架的实用性。
{"title":"A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces","authors":"Xiaodong Yang, O. Beg, M. Kenigsberg, Taylor T. Johnson","doi":"10.1145/3470455","DOIUrl":"https://doi.org/10.1145/3470455","url":null,"abstract":"Automata-based modeling of hybrid and cyber-physical systems (CPS) is an important formal abstraction amenable to algorithmic analysis of its dynamic behaviors, such as in verification, fault identification, and anomaly detection. However, for realistic systems, especially industrial ones, identifying hybrid automata is challenging, due in part to inferring hybrid interactions, which involves inference of both continuous behaviors, such as through classical system identification, as well as discrete behaviors, such as through automata (e.g., L*) learning. In this paper, we propose and evaluate a framework for inferring and validating models of deterministic hybrid systems with linear ordinary differential equations (ODEs) from input/output execution traces. The framework contains algorithms for the approximation of continuous dynamics in discrete modes, estimation of transition conditions, and the inference of automata mode merging. The algorithms are capable of clustering trace segments and estimating their dynamic parameters, and meanwhile, deriving guard conditions that are represented by multiple linear inequalities. Finally, the inferred model is automatically converted to the format of the original system for the validation. We demonstrate the utility of this framework by evaluating its performance in several case studies as implemented through a publicly available prototype software framework called HAutLearn and compare it with a membership-based algorithm.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach 工业4.0中雾支持的低延迟系统中断监测:一种联邦学习方法
Pub Date : 2022-02-04 DOI: 10.1145/3477272
B. Brik, M. Messaadia, M. Sahnoun, B. Bettayeb, M. Benatia
Industry 4.0 is based on machine learning and advanced digital technologies, such as Industrial-Internet-of-Things and Cyber-Physical-Production-Systems, to collect and process data coming from manufacturing systems. Thus, several industrial issues may be further investigated including, flows disruptions, machines’ breakdowns, quality crisis, and so on. In this context, traditional machine learning techniques require the data to be stored and processed in a central entity, e.g., a cloud server. However, these techniques are not suitable for all manufacturing use cases, due to the inaccessibility of private data such as resources’ localization in real time, which cannot be shared at the cloud level as they contain personal and sensitive information. Therefore, there is a critical need to go toward decentralized learning solutions to handle efficiently distributed private sub-datasets of manufacturing systems. In this article, we design a new monitoring tool for system disruption related to the localization of mobile resources. Our tool may identify mobile resources (human operators) that are in unexpected locations, and hence has a high probability to disturb production planning. To do so, we use federated deep learning, as distributed learning technique, to build a prediction model of resources locations in manufacturing systems. Our prediction model is generated based on resources locations defined in the initial tasks schedule. Thus, system disruptions are detected, in real time, when comparing predicted locations to the real ones, that is collected through the IoT network. In addition, our monitoring tool is deployed at Fog computing level that provides local data processing support with low latency. Furthermore, once a system disruption is detected, we develop a dynamic rescheduling module that assigns each task to the nearest available resource while improving the execution accuracy and reducing the execution delay. Therefore, we formulate an optimization problem of tasks rescheduling, before solving it using the meta-heuristic Tabu search. The numerical results show the efficiency of our schemes in terms of prediction accuracy when compared to other machine learning algorithms, in addition to their ability to detect and resolve system disruption in real time.
工业4.0基于机器学习和先进的数字技术,如工业物联网和网络物理生产系统,以收集和处理来自制造系统的数据。因此,一些工业问题可以进一步调查,包括,流动中断,机器故障,质量危机,等等。在这种情况下,传统的机器学习技术需要将数据存储和处理在一个中心实体中,例如云服务器。然而,这些技术并不适用于所有的制造用例,因为私有数据(如资源的实时定位)无法访问,这些数据由于包含个人和敏感信息而无法在云层面共享。因此,迫切需要去中心化的学习解决方案来有效地处理制造系统的分布式私有子数据集。在本文中,我们设计了一种新的监测工具,用于与移动资源本地化相关的系统中断。我们的工具可以识别处于意外位置的移动资源(人工操作员),因此很有可能干扰生产计划。为此,我们使用联邦深度学习作为分布式学习技术,来构建制造系统中资源位置的预测模型。我们的预测模型是基于初始任务计划中定义的资源位置生成的。因此,当将预测位置与通过物联网网络收集的实际位置进行比较时,可以实时检测到系统中断。此外,我们的监控工具部署在雾计算级别,提供低延迟的本地数据处理支持。此外,一旦检测到系统中断,我们开发了一个动态重新调度模块,该模块将每个任务分配给最近的可用资源,同时提高了执行准确性并减少了执行延迟。因此,我们提出了一个任务重调度的优化问题,然后使用元启发式禁忌搜索来解决它。数值结果表明,与其他机器学习算法相比,我们的方案在预测精度方面的效率,以及它们实时检测和解决系统中断的能力。
{"title":"Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach","authors":"B. Brik, M. Messaadia, M. Sahnoun, B. Bettayeb, M. Benatia","doi":"10.1145/3477272","DOIUrl":"https://doi.org/10.1145/3477272","url":null,"abstract":"Industry 4.0 is based on machine learning and advanced digital technologies, such as Industrial-Internet-of-Things and Cyber-Physical-Production-Systems, to collect and process data coming from manufacturing systems. Thus, several industrial issues may be further investigated including, flows disruptions, machines’ breakdowns, quality crisis, and so on. In this context, traditional machine learning techniques require the data to be stored and processed in a central entity, e.g., a cloud server. However, these techniques are not suitable for all manufacturing use cases, due to the inaccessibility of private data such as resources’ localization in real time, which cannot be shared at the cloud level as they contain personal and sensitive information. Therefore, there is a critical need to go toward decentralized learning solutions to handle efficiently distributed private sub-datasets of manufacturing systems. In this article, we design a new monitoring tool for system disruption related to the localization of mobile resources. Our tool may identify mobile resources (human operators) that are in unexpected locations, and hence has a high probability to disturb production planning. To do so, we use federated deep learning, as distributed learning technique, to build a prediction model of resources locations in manufacturing systems. Our prediction model is generated based on resources locations defined in the initial tasks schedule. Thus, system disruptions are detected, in real time, when comparing predicted locations to the real ones, that is collected through the IoT network. In addition, our monitoring tool is deployed at Fog computing level that provides local data processing support with low latency. Furthermore, once a system disruption is detected, we develop a dynamic rescheduling module that assigns each task to the nearest available resource while improving the execution accuracy and reducing the execution delay. Therefore, we formulate an optimization problem of tasks rescheduling, before solving it using the meta-heuristic Tabu search. The numerical results show the efficiency of our schemes in terms of prediction accuracy when compared to other machine learning algorithms, in addition to their ability to detect and resolve system disruption in real time.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems 面向信息物理系统智能预测性维护的混合深度学习框架
Pub Date : 2022-02-04 DOI: 10.1145/3486252
M. Shcherbakov, C. Sai
The proliferation of cyber-physical systems (CPSs) and the advancement of the Internet of Things (IoT) technologies have led to explosive digitization of the industrial sector. It offers promising perspectives for high reliability, availability, maintainability, and safety production process, but also makes the systems more complex and challenging for health assessment. To deal with these challenges, one needs to develop a robust approach to monitor and assess the system’s health state. In this article, a practical and effective hybrid deep learning multi-task framework integrating the advantages of convolutional neural network (CNN) and long short-term memory (LSTM) neural network to reflect the relatedness of remaining useful life prediction with health status detection process for complex multi-object systems in CPS environment is developed. The CNN is used as a feature extractor to compress condition monitoring data and directly extract significant spatiotemporal features from raw multi-sensory input data. The LSTM is used to capture long-term temporary dependency features. The advantages of the proposed hybrid deep learning framework have been verified on the popular NASA’s C-MAPSS dataset. The experimental study compares this approach to the existing methods using the same dataset. The results suggest that the proposed hybrid CNN-LSTM model is superior to existing methods, including traditional machine learning and deep learning-based methods. The proposed framework can provide strong support for the health management and maintenance strategy development of complex multi-object systems.
网络物理系统(cps)的扩散和物联网(IoT)技术的进步导致了工业部门的爆炸性数字化。它为高可靠性、可用性、可维护性和安全生产过程提供了有希望的前景,但也使系统更加复杂,对健康评估更具挑战性。为了应对这些挑战,需要开发一种健壮的方法来监视和评估系统的健康状态。本文结合卷积神经网络(CNN)和长短期记忆(LSTM)神经网络的优点,构建了一个实用有效的混合深度学习多任务框架,以反映CPS环境下复杂多目标系统剩余使用寿命预测与健康状态检测过程的相关性。利用CNN作为特征提取器对状态监测数据进行压缩,直接从原始多感官输入数据中提取重要的时空特征。LSTM用于捕获长期临时依赖特性。所提出的混合深度学习框架的优势已经在流行的NASA C-MAPSS数据集上得到验证。实验研究将该方法与使用相同数据集的现有方法进行了比较。结果表明,本文提出的CNN-LSTM混合模型优于现有的方法,包括传统的机器学习和基于深度学习的方法。该框架可为复杂多目标系统的健康管理和维护策略的制定提供强有力的支持。
{"title":"A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems","authors":"M. Shcherbakov, C. Sai","doi":"10.1145/3486252","DOIUrl":"https://doi.org/10.1145/3486252","url":null,"abstract":"The proliferation of cyber-physical systems (CPSs) and the advancement of the Internet of Things (IoT) technologies have led to explosive digitization of the industrial sector. It offers promising perspectives for high reliability, availability, maintainability, and safety production process, but also makes the systems more complex and challenging for health assessment. To deal with these challenges, one needs to develop a robust approach to monitor and assess the system’s health state. In this article, a practical and effective hybrid deep learning multi-task framework integrating the advantages of convolutional neural network (CNN) and long short-term memory (LSTM) neural network to reflect the relatedness of remaining useful life prediction with health status detection process for complex multi-object systems in CPS environment is developed. The CNN is used as a feature extractor to compress condition monitoring data and directly extract significant spatiotemporal features from raw multi-sensory input data. The LSTM is used to capture long-term temporary dependency features. The advantages of the proposed hybrid deep learning framework have been verified on the popular NASA’s C-MAPSS dataset. The experimental study compares this approach to the existing methods using the same dataset. The results suggest that the proposed hybrid CNN-LSTM model is superior to existing methods, including traditional machine learning and deep learning-based methods. The proposed framework can provide strong support for the health management and maintenance strategy development of complex multi-object systems.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114839371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Learning from Non-experts: An Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes 向非专家学习:智能家居中家电识别的互动和自适应学习方法
Pub Date : 2022-02-04 DOI: 10.1145/3491241
Jackson Codispoti, A. R. Khamesi, Nelson Penn, S. Silvestri, Eura Shin
With the acceleration of Information and Communication Technologies and the Internet-of-Things paradigm, smart residential environments, also known as smart homes, are becoming increasingly common. These environments have significant potential for the development of intelligent energy management systems and have therefore attracted significant attention from both academia and industry. An enabling building block for these systems is the ability of obtaining energy consumption at the appliance-level. This information is usually inferred from electric signals data (e.g., current) collected by a smart meter or a smart outlet, a problem known as appliance recognition. Several previous approaches for appliance recognition have proposed load disaggregation techniques for smart meter data. However, these approaches are often very inaccurate for low consumption and multi-state appliances. Recently, Machine Learning (ML) techniques have been proposed for appliance recognition. These approaches are mainly based on passive MLs, thus requiring pre-labeled data to be trained. This makes such approaches unable to rapidly adapt to the constantly changing availability and heterogeneity of appliances on the market. In a home setting scenario, it is natural to consider the involvement of users in the labeling process, as appliances’ electric signatures are collected. This type of learning falls into the category of Stream-based Active Learning (SAL). SAL has been mainly investigated assuming the presence of an expert, always available and willing to label the collected samples. Nevertheless, a home user may lack such availability, and in general present a more erratic and user-dependent behavior. In this article, we develop a SAL algorithm, called K-Active-Neighbors (KAN), for the problem of household appliance recognition. Differently from previous approaches, KAN jointly learns the user behavior and the appliance signatures. KAN dynamically adjusts the querying strategy to increase accuracy by considering the user availability as well as the quality of the collected signatures. Such quality is defined as a combination of informativeness, representativeness, and confidence score of the signature compared to the current knowledge. To test KAN versus state-of-the-art approaches, we use real appliance data collected by a low-cost Arduino-based smart outlet as well as the ECO smart home dataset. Furthermore, we use a real dataset to model user behavior. Results show that KAN is able to achieve high accuracy with minimal data, i.e., signatures of short length and collected at low frequency.
随着信息通信技术和物联网范式的加速发展,智能住宅环境也被称为智能家居,变得越来越普遍。这些环境对于智能能源管理系统的发展具有巨大的潜力,因此引起了学术界和工业界的极大关注。这些系统的一个启用构件是在设备级别获取能耗的能力。这些信息通常是从智能电表或智能插座收集的电信号数据(例如电流)中推断出来的,这个问题被称为电器识别。以前的几种电器识别方法已经提出了针对智能电表数据的负载分解技术。然而,对于低消耗和多状态设备,这些方法通常是非常不准确的。最近,机器学习(ML)技术被提出用于家电识别。这些方法主要基于被动机器学习,因此需要预先标记的数据进行训练。这使得这些方法无法快速适应市场上设备不断变化的可用性和异构性。在家庭场景中,很自然地考虑到用户参与标签过程,因为电器的电子签名被收集。这种类型的学习属于基于流的主动学习(SAL)的范畴。SAL主要是在假设有专家在场的情况下进行调查的,该专家总是在场并愿意给所收集的样品贴上标签。然而,家庭用户可能缺乏这种可用性,并且通常表现出更不稳定和依赖于用户的行为。在本文中,我们针对家用电器识别问题开发了一种称为K-Active-Neighbors (KAN)的SAL算法。与以前的方法不同,KAN是联合学习用户行为和设备签名的。KAN通过考虑用户可用性和收集签名的质量来动态调整查询策略以提高准确性。这种质量被定义为签名相对于当前知识的信息量、代表性和置信度得分的组合。为了测试KAN与最先进的方法,我们使用了由基于arduino的低成本智能插座以及ECO智能家居数据集收集的真实设备数据。此外,我们使用真实数据集来模拟用户行为。结果表明,该方法能够以较少的数据量(即短长度和低频采集的特征)获得较高的精度。
{"title":"Learning from Non-experts: An Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes","authors":"Jackson Codispoti, A. R. Khamesi, Nelson Penn, S. Silvestri, Eura Shin","doi":"10.1145/3491241","DOIUrl":"https://doi.org/10.1145/3491241","url":null,"abstract":"With the acceleration of Information and Communication Technologies and the Internet-of-Things paradigm, smart residential environments, also known as smart homes, are becoming increasingly common. These environments have significant potential for the development of intelligent energy management systems and have therefore attracted significant attention from both academia and industry. An enabling building block for these systems is the ability of obtaining energy consumption at the appliance-level. This information is usually inferred from electric signals data (e.g., current) collected by a smart meter or a smart outlet, a problem known as appliance recognition. Several previous approaches for appliance recognition have proposed load disaggregation techniques for smart meter data. However, these approaches are often very inaccurate for low consumption and multi-state appliances. Recently, Machine Learning (ML) techniques have been proposed for appliance recognition. These approaches are mainly based on passive MLs, thus requiring pre-labeled data to be trained. This makes such approaches unable to rapidly adapt to the constantly changing availability and heterogeneity of appliances on the market. In a home setting scenario, it is natural to consider the involvement of users in the labeling process, as appliances’ electric signatures are collected. This type of learning falls into the category of Stream-based Active Learning (SAL). SAL has been mainly investigated assuming the presence of an expert, always available and willing to label the collected samples. Nevertheless, a home user may lack such availability, and in general present a more erratic and user-dependent behavior. In this article, we develop a SAL algorithm, called K-Active-Neighbors (KAN), for the problem of household appliance recognition. Differently from previous approaches, KAN jointly learns the user behavior and the appliance signatures. KAN dynamically adjusts the querying strategy to increase accuracy by considering the user availability as well as the quality of the collected signatures. Such quality is defined as a combination of informativeness, representativeness, and confidence score of the signature compared to the current knowledge. To test KAN versus state-of-the-art approaches, we use real appliance data collected by a low-cost Arduino-based smart outlet as well as the ECO smart home dataset. Furthermore, we use a real dataset to model user behavior. Results show that KAN is able to achieve high accuracy with minimal data, i.e., signatures of short length and collected at low frequency.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
FreeSia: A Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis 小苍兰:一种通过频域室内运动分析进行认知评估的网络物理系统
Pub Date : 2022-02-04 DOI: 10.1145/3470454
E. Khodabandehloo, A. Alimohammadi, Daniele Riboni
Thanks to the seamless integration of sensing, networking, and artificial intelligence, cyber-physical systems promise to improve healthcare by increasing efficiency and reducing costs. Specifically, cyber-physical systems are being increasingly applied in smart-homes to support independent and healthy aging. Due to the growing prevalence of noncommunicable diseases in the senior population, a key application in this domain is the detection of cognitive issues based on sensor data. In this article, we propose a novel cyber-physical system for cognitive assessment in smart-homes. Cognitive evaluation relies on clinical indicators characterizing symptoms of dementia based on the individual’s movement patterns. However, recognizing these patterns in smart-homes is challenging, because movement is constrained by the home layout and obstacles. Since different abnormal patterns are characterized by undulatory-like trajectories, we conjecture that frequency-based locomotion features may more effectively capture these patterns with respect to traditional features in the spatio-temporal domain. Based on this intuition, we introduce novel feature extraction techniques and adopt state-of-the-art machine learning algorithms for short- and long-term cognitive evaluation. Our system includes a user-friendly interface that enables clinicians to inspect the data and predictions. Extensive experiments carried out with a real-world dataset acquired from both cognitively healthy seniors and people with dementia show the superiority of our frequency-based features. Moreover, further experiments with an ensemble method show that prediction accuracy can be enhanced by combining features in the frequency and time domains.
由于传感、网络和人工智能的无缝集成,网络物理系统有望通过提高效率和降低成本来改善医疗保健。具体而言,网络物理系统越来越多地应用于智能家居,以支持独立和健康的老龄化。由于非传染性疾病在老年人群中日益流行,该领域的一个关键应用是基于传感器数据的认知问题检测。在本文中,我们提出了一种用于智能家居认知评估的新型网络物理系统。认知评估依赖于基于个体运动模式表征痴呆症状的临床指标。然而,在智能家居中识别这些模式是具有挑战性的,因为移动受到家居布局和障碍物的限制。由于不同的异常模式具有波动样轨迹的特征,我们推测基于频率的运动特征可以更有效地捕获这些模式,相对于传统特征在时空域。基于这种直觉,我们引入了新的特征提取技术,并采用了最先进的机器学习算法进行短期和长期认知评估。我们的系统包括一个用户友好的界面,使临床医生能够检查数据和预测。从认知健康的老年人和痴呆症患者中获得的真实数据集进行的大量实验表明,我们基于频率的特征具有优势。此外,用集成方法进行的进一步实验表明,结合频域和时域特征可以提高预测精度。
{"title":"FreeSia: A Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis","authors":"E. Khodabandehloo, A. Alimohammadi, Daniele Riboni","doi":"10.1145/3470454","DOIUrl":"https://doi.org/10.1145/3470454","url":null,"abstract":"Thanks to the seamless integration of sensing, networking, and artificial intelligence, cyber-physical systems promise to improve healthcare by increasing efficiency and reducing costs. Specifically, cyber-physical systems are being increasingly applied in smart-homes to support independent and healthy aging. Due to the growing prevalence of noncommunicable diseases in the senior population, a key application in this domain is the detection of cognitive issues based on sensor data. In this article, we propose a novel cyber-physical system for cognitive assessment in smart-homes. Cognitive evaluation relies on clinical indicators characterizing symptoms of dementia based on the individual’s movement patterns. However, recognizing these patterns in smart-homes is challenging, because movement is constrained by the home layout and obstacles. Since different abnormal patterns are characterized by undulatory-like trajectories, we conjecture that frequency-based locomotion features may more effectively capture these patterns with respect to traditional features in the spatio-temporal domain. Based on this intuition, we introduce novel feature extraction techniques and adopt state-of-the-art machine learning algorithms for short- and long-term cognitive evaluation. Our system includes a user-friendly interface that enables clinicians to inspect the data and predictions. Extensive experiments carried out with a real-world dataset acquired from both cognitively healthy seniors and people with dementia show the superiority of our frequency-based features. Moreover, further experiments with an ensemble method show that prediction accuracy can be enhanced by combining features in the frequency and time domains.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131618392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits ASHRAY:利用数据驱动的物联网改造提高发展中地区的用水舒适度
Pub Date : 2022-02-04 DOI: 10.1145/3491242
Samar F. Abbas, Ahmed Ehsan, Saad Ahmed, Sheraz Ali Khan, Tariq M. Jadoon, Muhammad Hamad Alizai
In developing countries, majority of the households use overhead water tanks to have running water. These water tanks are exposed to the elements, which usually render the tap water uncomfortable to use, given the extreme subtropical weather conditions. Externally weatherproofing these tanks to maintain the groundwater temperature is short-lived, and only results in a marginal (0.5°C–1°C) improvement in tap water temperature. We propose Ashray, an IoT-inspired, intelligent system to minimize the exposure of water to the elements thereby maintaining its temperature close to that of the groundwater. Ashray learns the water demand patterns of a household and pumps water into the overhead tank only when necessary. The predictive, machine learning based, approach of Ashray improves water comfort by up to 8°C in summers and 3°C in winters, on average. Ashray is retrofitted into existing infrastructure with a hardware prototyping cost of $27, whereas it can save up to 16% on water heating costs, through reduction in natural gas consumption, by leveraging groundwater temperature. Moreover, we also consider a transiently-powered Ashray, which uses the energy harvested from the ambient environment, and propose an intermittent data pipeline to improve its prediction accuracy. The transiently-powered Ashray is suitable for long-term deployment, requires minimal maintenance and delivers approximately the same performance. Ashray has the potential to improve the thermal comfort and reduce energy costs for millions of households in developing countries.
在发展中国家,大多数家庭使用头顶的水箱来获得自来水。这些水箱暴露在极端的亚热带天气条件下,通常会使自来水使用起来不舒服。外部防风雨的这些水箱,以保持地下水温度是短暂的,只导致自来水温度的边际(0.5°C - 1°C)的改善。我们提出了Ashray,这是一个受物联网启发的智能系统,可以最大限度地减少水对元素的暴露,从而保持其温度接近地下水的温度。Ashray了解一个家庭的用水模式,只在必要的时候才把水抽到头顶的水箱里。Ashray基于机器学习的预测方法在夏季平均可将水舒适度提高8°C,在冬季平均可提高3°C。Ashray在现有基础设施中进行改造,硬件原型成本为27美元,而通过利用地下水温度,减少天然气消耗,可以节省高达16%的热水成本。此外,我们还考虑了一种瞬态供电的Ashray,它利用从周围环境中收集的能量,并提出了一个间歇数据管道来提高其预测精度。暂态供电的Ashray适合长期部署,需要最少的维护并提供大致相同的性能。Ashray有可能改善发展中国家数百万家庭的热舒适性并降低能源成本。
{"title":"ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits","authors":"Samar F. Abbas, Ahmed Ehsan, Saad Ahmed, Sheraz Ali Khan, Tariq M. Jadoon, Muhammad Hamad Alizai","doi":"10.1145/3491242","DOIUrl":"https://doi.org/10.1145/3491242","url":null,"abstract":"In developing countries, majority of the households use overhead water tanks to have running water. These water tanks are exposed to the elements, which usually render the tap water uncomfortable to use, given the extreme subtropical weather conditions. Externally weatherproofing these tanks to maintain the groundwater temperature is short-lived, and only results in a marginal (0.5°C–1°C) improvement in tap water temperature. We propose Ashray, an IoT-inspired, intelligent system to minimize the exposure of water to the elements thereby maintaining its temperature close to that of the groundwater. Ashray learns the water demand patterns of a household and pumps water into the overhead tank only when necessary. The predictive, machine learning based, approach of Ashray improves water comfort by up to 8°C in summers and 3°C in winters, on average. Ashray is retrofitted into existing infrastructure with a hardware prototyping cost of $27, whereas it can save up to 16% on water heating costs, through reduction in natural gas consumption, by leveraging groundwater temperature. Moreover, we also consider a transiently-powered Ashray, which uses the energy harvested from the ambient environment, and propose an intermittent data pipeline to improve its prediction accuracy. The transiently-powered Ashray is suitable for long-term deployment, requires minimal maintenance and delivers approximately the same performance. Ashray has the potential to improve the thermal comfort and reduce energy costs for millions of households in developing countries.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness 网络物理系统的边缘计算:强调可信度的系统映射研究
Pub Date : 2021-11-26 DOI: 10.1145/3539662
J. Sánchez, Nils Jörgensen, Martin Törngren, R. Inam, Andrii Berezovskyi, Lei Feng, E. Fersman, Muhammad Rusyadi Ramli, Kaige Tan
Edge computing is projected to have profound implications in the coming decades, proposed to provide solutions for applications such as augmented reality, predictive functionalities, and collaborative Cyber-Physical Systems (CPS). For such applications, edge computing addresses the new computational needs, as well as privacy, availability, and real-time constraints, by providing local high-performance computing capabilities to deal with the limitations and constraints of cloud and embedded systems. Edge computing is today driven by strong market forces stemming from IT/cloud, telecom, and networking—with corresponding multiple interpretations of “edge computing” (e.g., device edge, network edge, distributed cloud). Considering the strong drivers for edge computing and the relative novelty of the field, it becomes important to understand the specific requirements and characteristics of edge-based CPS, and to ensure that research is guided adequately, e.g., avoiding specific gaps. Our interests lie in the applications of edge computing as part of CPS, where several properties (or attributes) of trustworthiness, including safety, security, and predictability/availability, are of particular concern, each facing challenges for the introduction of edge-based CPS. We present the results of a systematic mapping study, a kind of systematic literature survey, investigating the use of edge computing for CPS with a special emphasis on trustworthiness. The main contributions of this study are a detailed description of the current research efforts in edge-based CPS and the identification and discussion of trends and research gaps. The results show that the main body of research in edge-based CPS only to a very limited extent consider key attributes of system trustworthiness, despite many efforts referring to critical CPS and applications like intelligent transportation. More research and industrial efforts will be needed on aspects of trustworthiness of future edge-based CPS including their experimental evaluation. Such research needs to consider the multiple interrelated attributes of trustworthiness including safety, security, and predictability, and new methodologies and architectures to address them. It is further important to provide bridges and collaboration between edge computing and CPS disciplines.
边缘计算预计将在未来几十年产生深远的影响,为增强现实、预测功能和协作网络物理系统(CPS)等应用提供解决方案。对于这些应用程序,边缘计算通过提供本地高性能计算能力来处理云和嵌入式系统的限制和约束,解决了新的计算需求,以及隐私、可用性和实时限制。今天,边缘计算是由来自IT/云、电信和网络的强大市场力量驱动的,对“边缘计算”有相应的多种解释(例如,设备边缘、网络边缘、分布式云)。考虑到边缘计算的强大驱动因素和该领域的相对新颖性,了解基于边缘的CPS的具体要求和特征,并确保研究得到充分指导变得非常重要,例如,避免特定的差距。我们的兴趣在于边缘计算作为CPS的一部分的应用,其中几个值得信赖的属性(或属性),包括安全性,安全性和可预测性/可用性,是特别关注的,每个都面临着引入基于边缘的CPS的挑战。我们提出了一项系统测绘研究的结果,这是一种系统的文献调查,研究了边缘计算在CPS中的使用,特别强调了可信度。本研究的主要贡献是详细描述了基于边缘的CPS的当前研究成果,并确定和讨论了趋势和研究差距。结果表明,尽管许多研究涉及关键CPS和智能交通等应用,但基于边缘的CPS的研究主体仅在非常有限的程度上考虑了系统可信度的关键属性。未来基于边缘的CPS的可信度方面需要更多的研究和工业努力,包括实验评估。此类研究需要考虑可信性的多个相互关联的属性,包括安全性、安全性和可预测性,以及解决这些属性的新方法和体系结构。在边缘计算和CPS学科之间提供桥梁和协作也很重要。
{"title":"Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness","authors":"J. Sánchez, Nils Jörgensen, Martin Törngren, R. Inam, Andrii Berezovskyi, Lei Feng, E. Fersman, Muhammad Rusyadi Ramli, Kaige Tan","doi":"10.1145/3539662","DOIUrl":"https://doi.org/10.1145/3539662","url":null,"abstract":"Edge computing is projected to have profound implications in the coming decades, proposed to provide solutions for applications such as augmented reality, predictive functionalities, and collaborative Cyber-Physical Systems (CPS). For such applications, edge computing addresses the new computational needs, as well as privacy, availability, and real-time constraints, by providing local high-performance computing capabilities to deal with the limitations and constraints of cloud and embedded systems. Edge computing is today driven by strong market forces stemming from IT/cloud, telecom, and networking—with corresponding multiple interpretations of “edge computing” (e.g., device edge, network edge, distributed cloud). Considering the strong drivers for edge computing and the relative novelty of the field, it becomes important to understand the specific requirements and characteristics of edge-based CPS, and to ensure that research is guided adequately, e.g., avoiding specific gaps. Our interests lie in the applications of edge computing as part of CPS, where several properties (or attributes) of trustworthiness, including safety, security, and predictability/availability, are of particular concern, each facing challenges for the introduction of edge-based CPS. We present the results of a systematic mapping study, a kind of systematic literature survey, investigating the use of edge computing for CPS with a special emphasis on trustworthiness. The main contributions of this study are a detailed description of the current research efforts in edge-based CPS and the identification and discussion of trends and research gaps. The results show that the main body of research in edge-based CPS only to a very limited extent consider key attributes of system trustworthiness, despite many efforts referring to critical CPS and applications like intelligent transportation. More research and industrial efforts will be needed on aspects of trustworthiness of future edge-based CPS including their experimental evaluation. Such research needs to consider the multiple interrelated attributes of trustworthiness including safety, security, and predictability, and new methodologies and architectures to address them. It is further important to provide bridges and collaboration between edge computing and CPS disciplines.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey 应用驱动对抗性实例研究进展与挑战综述
Pub Date : 2021-09-22 DOI: 10.1145/3470493
Wei Jiang, Zhiyuan He, Jinyu Zhan, Weijia Pan, Deepak Adhikari
Great progress has been made in deep learning over the past few years, which drives the deployment of deep learning–based applications into cyber-physical systems. But the lack of interpretability for deep learning models has led to potential security holes. Recent research has found that deep neural networks are vulnerable to well-designed input examples, called adversarial examples. Such examples are often too small to detect, but they completely fool deep learning models. In practice, adversarial attacks pose a serious threat to the success of deep learning. With the continuous development of deep learning applications, adversarial examples for different fields have also received attention. In this article, we summarize the methods of generating adversarial examples in computer vision, speech recognition, and natural language processing and study the applications of adversarial examples. We also explore emerging research and open problems.
在过去的几年里,深度学习取得了巨大的进步,这推动了基于深度学习的应用程序在网络物理系统中的部署。但是深度学习模型缺乏可解释性导致了潜在的安全漏洞。最近的研究发现,深度神经网络容易受到设计良好的输入示例(称为对抗性示例)的影响。这样的例子通常太小而无法检测,但它们完全欺骗了深度学习模型。在实践中,对抗性攻击对深度学习的成功构成了严重威胁。随着深度学习应用的不断发展,不同领域的对抗样例也受到了关注。本文综述了计算机视觉、语音识别和自然语言处理中生成对抗样例的方法,并研究了对抗样例的应用。我们也探索新兴研究和开放的问题。
{"title":"Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey","authors":"Wei Jiang, Zhiyuan He, Jinyu Zhan, Weijia Pan, Deepak Adhikari","doi":"10.1145/3470493","DOIUrl":"https://doi.org/10.1145/3470493","url":null,"abstract":"Great progress has been made in deep learning over the past few years, which drives the deployment of deep learning–based applications into cyber-physical systems. But the lack of interpretability for deep learning models has led to potential security holes. Recent research has found that deep neural networks are vulnerable to well-designed input examples, called adversarial examples. Such examples are often too small to detect, but they completely fool deep learning models. In practice, adversarial attacks pose a serious threat to the success of deep learning. With the continuous development of deep learning applications, adversarial examples for different fields have also received attention. In this article, we summarize the methods of generating adversarial examples in computer vision, speech recognition, and natural language processing and study the applications of adversarial examples. We also explore emerging research and open problems.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126257878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems 元学习改进网络物理系统中的无监督入侵检测
Pub Date : 2021-09-22 DOI: 10.1145/3467470
T. Zoppi, M. Gharib, M. Atif, A. Bondavalli
Artificial Intelligence (AI)-based classifiers rely on Machine Learning (ML) algorithms to provide functionalities that system architects are often willing to integrate into critical Cyber-Physical Systems (CPSs). However, such algorithms may misclassify observations, with potential detrimental effects on the system itself or on the health of people and of the environment. In addition, CPSs may be subject to threats that were not previously known, motivating the need for building Intrusion Detectors (IDs) that can effectively deal with zero-day attacks. Different studies were directed to compare misclassifications of various algorithms to identify the most suitable one for a given system. Unfortunately, even the most suitable algorithm may still show an unsatisfactory number of misclassifications when system requirements are strict. A possible solution may rely on the adoption of meta-learners, which build ensembles of base-learners to reduce misclassifications and that are widely used for supervised learning. Meta-learners have the potential to reduce misclassifications with respect to non-meta learners: however, misleading base-learners may let the meta-learner leaning towards misclassifications and therefore their behavior needs to be carefully assessed through empirical evaluation. To such extent, in this paper we investigate, expand, empirically evaluate, and discuss meta-learning approaches that rely on ensembles of unsupervised algorithms to detect (zero-day) intrusions in CPSs. Our experimental comparison is conducted by means of public datasets belonging to network intrusion detection and biometric authentication systems, which are common IDSs for CPSs. Overall, we selected 21 datasets, 15 unsupervised algorithms and 9 different meta-learning approaches. Results allow discussing the applicability and suitability of meta-learning for unsupervised anomaly detection, comparing metric scores achieved by base algorithms and meta-learners. Analyses and discussion end up showing how the adoption of meta-learners significantly reduces misclassifications when detecting (zero-day) intrusions in CPSs.
基于人工智能(AI)的分类器依赖于机器学习(ML)算法来提供系统架构师通常愿意集成到关键网络物理系统(cps)中的功能。然而,这种算法可能会对观测结果进行错误分类,对系统本身或对人类健康和环境产生潜在的有害影响。此外,cps可能会受到以前不知道的威胁,因此需要构建能够有效处理零日攻击的入侵探测器(IDs)。不同的研究旨在比较各种算法的错误分类,以确定最适合给定系统的算法。不幸的是,当系统要求严格时,即使是最合适的算法也可能显示出令人不满意的错误分类数量。一种可能的解决方案可能依赖于采用元学习器,它构建基础学习器的集合以减少错误分类,并广泛用于监督学习。相对于非元学习者,元学习者有减少错误分类的潜力:然而,误导基础学习者可能会让元学习者倾向于错误分类,因此需要通过经验评估仔细评估他们的行为。在这种程度上,在本文中,我们调查、扩展、经验评估和讨论了依赖于无监督算法集成来检测cps中的(零日)入侵的元学习方法。我们的实验比较是通过属于网络入侵检测和生物识别认证系统的公共数据集进行的,这是cps常见的ids。总的来说,我们选择了21个数据集,15个无监督算法和9种不同的元学习方法。结果允许讨论元学习在无监督异常检测中的适用性和适用性,比较基本算法和元学习器获得的度量分数。分析和讨论最终表明,在检测cps中的(零日)入侵时,采用元学习器如何显著减少错误分类。
{"title":"Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems","authors":"T. Zoppi, M. Gharib, M. Atif, A. Bondavalli","doi":"10.1145/3467470","DOIUrl":"https://doi.org/10.1145/3467470","url":null,"abstract":"Artificial Intelligence (AI)-based classifiers rely on Machine Learning (ML) algorithms to provide functionalities that system architects are often willing to integrate into critical Cyber-Physical Systems (CPSs). However, such algorithms may misclassify observations, with potential detrimental effects on the system itself or on the health of people and of the environment. In addition, CPSs may be subject to threats that were not previously known, motivating the need for building Intrusion Detectors (IDs) that can effectively deal with zero-day attacks. Different studies were directed to compare misclassifications of various algorithms to identify the most suitable one for a given system. Unfortunately, even the most suitable algorithm may still show an unsatisfactory number of misclassifications when system requirements are strict. A possible solution may rely on the adoption of meta-learners, which build ensembles of base-learners to reduce misclassifications and that are widely used for supervised learning. Meta-learners have the potential to reduce misclassifications with respect to non-meta learners: however, misleading base-learners may let the meta-learner leaning towards misclassifications and therefore their behavior needs to be carefully assessed through empirical evaluation. To such extent, in this paper we investigate, expand, empirically evaluate, and discuss meta-learning approaches that rely on ensembles of unsupervised algorithms to detect (zero-day) intrusions in CPSs. Our experimental comparison is conducted by means of public datasets belonging to network intrusion detection and biometric authentication systems, which are common IDSs for CPSs. Overall, we selected 21 datasets, 15 unsupervised algorithms and 9 different meta-learning approaches. Results allow discussing the applicability and suitability of meta-learning for unsupervised anomaly detection, comparing metric scores achieved by base algorithms and meta-learners. Analyses and discussion end up showing how the adoption of meta-learners significantly reduces misclassifications when detecting (zero-day) intrusions in CPSs.","PeriodicalId":380257,"journal":{"name":"ACM Transactions on Cyber-Physical Systems (TCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
ACM Transactions on Cyber-Physical Systems (TCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1