Download Systems of Systems

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed operating system wikipedia , lookup

Transcript
Systems of Systems:
Cybersecurity Vulnerabilities
and Opportunities
Donald Wunsch, ACIL Director
Ann Miller, TSL Director
Applied Mathematics for Deregulated
Electric Power Systems:
Optimization, Control, and Computational Intelligence
Crystal City, November 2003
Applied Computational Intelligence Lab & Trustworthy Systems Lab
University of Missouri - Rolla
Acknowledgements

Personnel
–


Funding
– NSF
– Sandia
– Boeing
– MK Finley Professorship
– Cindy Tang Professorship
Senior Personnel
–
–
–
–
–
–
Ganesh Kumar
Venayagamoorthy
Ron Harley
Daryl Beetner
Danil Prokhorov
Raonak Uz-Zaman
Frank Harary
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
Narayan Vishwanathan
Amit Agarwahl
Sam Mulder
Wenxin Liu
Nian Zhang
Alexander Novokhodko
Xindi Cai
Rohit Dua
Hu Xiao
Rui Xu
Brian Blaha
Paul Pigg
Arvind Rapka Nath
Qiang Yao
Kevin Bollum
Anjaya Shrestra
Karthik Balasubramanian
Pinar Demircan
Daniel Treat
Ian Downard
Eyad Salah Tagiedin
Ganesh Sridharan
Jason White
Krishnaprasad Balasubramanian
Dayle Majors
Nartaj Lakshminarasimhan
Siddarth Panchal
Robert Wayne Denier
Tongquan Wei
Jimish Doshi
Ravikiran Sharda
Systems of Systems:
Interdependencies

“system of systems”
–
–
Grown/evolved by adding components not
initially designed to be part of the system
Interdependencies not easily identified
Potential for cascading failures
 Potential for hidden robustness

Issues in Systems of
Systems
Trustworthiness
 Testing
 Market Demands
 Complexity
 Safety
 Life-Cycle Model
 Integration

Recommended disk space, MB
Complexity:
Software Size Growth
100
10
Math package 1
Math package 2
Math package 3
1
1984 86
88
90
92
94
96
1998
Source: IEEE Spectrum, January 1998
Complexity:
Software Size Growth
Complexity: Interdependencies
A graph representing
almost 6 million lines
of computer code. The
graph contains
approximately 33
thousand nodes and 34
thousand relations.
Source: NATO
Report on
Visualization, 1999.
Failure Rates – System Calls
Memory management
File directory Access
I/O Primitives
Process Primitives
Process environment
Memory management
File directory Access
I/O Primitives
Process Primitives
Process environment
Memory management
File directory Access
I/O Primitives
Process Primitives
Process environment
Memory management
File directory Access
I/O Primitives
Process Primitives
Process environment
LINUX
NT
Win-2000
Win-CE
0
(Source:
5
20
15
10
Carnegie
Mellon,
CS Dept.)
Normalised
Failure
Rate, %
25
30
Effects of Complexity
and Growth
Cascading failures
 Opportunities for errors
 Control, Communication, IT

–
–

Pres. Commission on Critical Infrastructure
Protection
Particularly EMS & SCADA
Voltage Collapse
High-Consequence

Even brief – expensive
–
Circuit fab: 20 min = ($30 M)

Recent large disruption caused deaths

Backups no guarantee
–
Well-known in software safety circles
 Therac
25 classic example
Complexity: Ripple Effect
Example

At 0903 CST on 18 December 1997, at the Olathe
(Kansas City) Air Route Traffic Control Center, a
technician routed power through half of the redundant
uninterruptible power system, preparatory to
performing the annual preventive maintenance on the
other half. Apparently the wrong board was pulled.
Complexity: Ripple Effect
Example

Results:
–
–
–
Power only out for 4 minutes
Radar and communications working within 17
minutes
However, at least 300 planes were in the Olathecontrolled airspace; domino effect: hundreds of
flights canceled, diverted, or delayed with
problems well into the evening.
Back-up Systems Are Not a
Guarantee
Not only did the Air Route Traffic
Control Center have redundant systems,
there were also standby generators and
emergency batteries.
 Yet, that December morning, these backup systems were bypassed.
 Why?

Complex Interactions:
States and Inputs
The back-up systems were bypassed
because the system was in a
maintenance state.
 This particular combination of inputs
was not anticipated to occur when the
system was in maintenance mode.

Tempting Target
Dramatic growth in number of
knowledgeable experts
 Potential to insert incorrect data or
Denial of Service attacks
 High leverage / low risk

Computational Intelligence
Tools Can Help
Neural Net Intrusion Detection
 ADP Robust Controls
 Combinatorial Optimization for
reconfigurability

Intrusion Detection with Neural
Nets
RBFNs can be used for misuse and
anomaly detection using sequences
of system calls
 Data are obtained from 1998
DARPA Intrusion Detection
Evaluation program
 Also collaboration with Sandia
Red Team

1
RBFNN Generalization on
unknown test data
0.9
0.8
True positives
0.7
0.6
0.5
0.4
0.3
0.2
accuracy=0.74
0.1
0
0
0.1
0.2
0.3
0.4
0.5
0.6
False positives
0.7
0.8
0.9
1
PNN + ADABOOST
Multi-Machine Power System Control
Multi-Machine Power System with
Conventional Controllers
Dw1
Governor
1
4
900 Km
Dw2
5
2
G1
Governor
G2
S
S
Turbine
Pref1
Turbine
Exciter
Ve1
Vt1
AVR
Exciter
900 Km
900 Km
Vt2
3
Vref1
G3
Pref2
Ve2
Vref2
AVR
Multi-Machine Power System with
DHP Neurocontrollers
D P1
Governor
4
1
900 Km
5
Governor
2
G1
DP2
G2
S
S
Turbine
Turbine
Exciter
Pref1
Vf1
Vref1
DVref1
S
Vt1
TDL
Exciter
900 Km
900 Km
D w2
D w1
3
TDL
Neurocontoller
TDL
Vt2
TDL
Pref2
Vf2
S
Vref2
DVref2
Neurocontoller
G3
DHP Critic Network Adaptation
Yref
TDL
ACTION
Neural
Network
PLANT
Y(t)
U (t )
A(t )
A(t)
 (t+1)
MODEL
Neural
TDL
Network
TDL
TDL
+ S+

^
D Y (t  1)
^
D Y (t )
^
D Y (t  1)
 (t  1)

J (t  1)
^
D Y (t  1)
+
-
S
U (t )
DY (t )
MODEL
Neural
Network
CRITIC
Neural
Network
^
D Y (t )
^
TDL
D Y (t  1)
TDL
D Y (t  2)
^
EC2(t)
CRITIC
Neural
Network
 (t  1)

J (t  1)
^
D Y (t  1)
Terminal Voltage of Generator G2 for a
5% Step Change in its Desired Terminal
Voltage & Operating Point Changed
1.08
Terminal voltage in pu
1.07
1.06
1.05
1.04
1.03
1.02
1.01
AVR
1
DHP
0.99
0.98
1
2
3
4
5
Time in seconds
6
7
8
Speed Deviation of Generator G2 Operating Point Changed
-3
x 10
1.5
Speed deviation of G1 in pu
1
0.5
0
-0.5
Conventional
-1
Neurocontroller
-1.5
0
1
2
3
4
Time in seconds
5
6
7
8
Traveling Salesman Problem
Great benchmark
 NP – complete

–
Maps to other NP – complete problems

Public databases

Big need – get learning capability of
NN without brittleness of other
techniques.
Previous contributions -- disappointing
Paper
Method
Largest
Quality
Instance
(percent
Test bed
excess over
optimal )
[11]
1st
100
14.6%
NS
[13]
1st
100
14%
NS
[10]
1st
400
NR
NS
[5]
2nd
532
6.8%
TSPLIB
[12]
1st
1000
NR
NS
[16]
2nd
1000
NR
NS
[15]
1st
2392
5%
TSPLIB
[17]
2nd
2392
9%
TSPLIB
[2]
1st
10000
NR
NS
[4]
1st
11849
17.4%
TSPLIB
Clustered Traveling Salesman
Divide problem into clusters using ART
in O(n)
 Use Lin-Kernighan algorithm for global
tour
 Use Lin-Kernighan algorithm for local
tours
 Merge local tours in O(n) time
 Global operations limited to O(n) time

Algorithm Overview
ART O(n lg n)
cluster
LK O(k2.2)
cluster
LK O(k2.2)
cluster
LK O(k2.2)
Merge
Clusters O(n)
Read problem
from file O(n)
Result
Implementation
Implemented in C++ thread-safe code
 Uses Windows threads for parallelism
 Operating System-specific code isolated to one
file
 Should be easy to port to other parallel systems


#cities Tour Length 1P Time
1000
2.58E+07
0.422
2P Time Vig factor
0.281
0.7
% off
10.40%
Speedup
1.50

2000
3.61E+07
1.031
0.672
0.7
10.64%
1.53

8000
7.14E+07
8.328
4.281
0.72
10.97%
1.95

10000
7.97E+07
11.359
7.297
0.75
10.57%
1.56

20000
1.12E+08
24.641
14.406
0.8
10.53%
1.71

250000 4.00E+08
315.078
209.687
0.92
11.64%
1.50

1000000 7.94E+08
1468.165
986.48
0.97
11.03%
1.49

10000000 2.52E+09
10528.7
0.98
1.27%

CONCORDE

1000
2.34E+07
1.670

2000
3.26E+07
3.500

8000
6.43E+07
26.570

10000
7.20E+07
37.620

20000
1.01E+08
84.830

250000 3.58E+08

1000000 7.15E+08
9013.53
10000000 2.495E+09 43630.7


1379.540
1k
4k
8k
10k
20k
50k
85k
150k
250k
1M
Even better news…
Continued Scaling Results
 Parallelizability
 Memory Management

BUT – To Move Beyond

Clear Need for more advanced
architectures
–
Especially to Learn
from
Experience
Cellular Structures necessary
 Same with SRNs
 Therefore, combine them and
ACDs

Recurrent Nets
Obviously achieve dynamic behaviors
 Possible similarity to adaptive systems
but with fixed parameters
 Simultaneous recurrent nets particularly
challenging, esp. architectures

Generalized Maze Problem
•Graph Theoretic Representation
•SRN Necessary (Werbos & Pang, ’96 &
’98)
•Cellular structure – scaling
•Closed form now
•Convergence time now
•Importance of design principles
Design from output backward
Require for the output node:
x16
=
(x2 / x1)[min{x6, x5, x4, x3} + 1].
This is a known SRN!
Cellular SRN Structure
Complete
+1
S
Output J = (x2/x1) * sum =
x16(a,b)
/ *
Current
Node inputs
Product Nodes
Neighbor
node inputs
Feedback
inputs
(Occurs at each node (a,b) in maze.)
Analyze worst-case
convergence
WCT = N2 - 2N + N - 3 = N2 - N - 3.
Note that this is convergence in J steps.
Also true for N x N maze by simple induction proof.
Conclusions
Power networks inherit the full range
of “systems of systems” issues.
 These are amenable to computational
intelligence solutions:

–
–
–
Detection
Robust Control
Reconfigurability
 Combinatorial
Optimization