scholarly journals Analysis of the Sensitivity of Algorithms for Assessing the Harmful Information Indicators in the Interests of Cyber-Physical Security

Electronics ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 284 ◽  
Author(s):  
Igor Kotenko ◽  
Igor Parashchuk

The secure functioning of cyber-physical systems depends on the presence and amount of harmful (unwanted and malicious) information in its digital network content. The functioning of cyber-physical systems is carried out in non-stationary conditions and in conditions of continuous exposures. This leads to the uncertainty of indicators (parameters, features) of harmful information that must be assessed in the analytical processing of digital network content. The paper proposes an approach to analyse the sensitivity of algorithms for estimating the status of indicators of harmful information observed in noise. This approach allows one to consider possible errors in the estimation accuracy. It gives the possibility to identify the allowable range of changes in the parameters of the digital network content of cyber-physical systems, within which the requirements for the assessment reliability are met. This, in turn, makes a significant contribution to the effectiveness of harmful information detection and counteraction against it. Accounting for a priori uncertainty of the indicators under various influences is advisable to carry out on the basis of expressions for the sensitivity coefficients (functions) described in the paper.

Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 47
Author(s):  
Alexander Vodyaho ◽  
Saddam Abbas ◽  
Nataly Zhukova ◽  
Michael Chervoncev

The distinctive feature of new generation information systems is not only their complexity in terms of number of elements, number of connections and hierarchy levels, but also their constantly changing structure and behavior. In this situation the problem of receiving actual information about the observed complex Cyber–Physical Systems (CPS) current status becomes a rather difficult task. This information is needed by stakeholders for solving tasks concerning keeping the system operational, improving its efficiency, ensuring security, etc. Known approaches to solving the problem of the complex distributed CPS actual status definition are not enough effective. The authors propose a model based approach to solving the task of monitoring the status of complex CPS. There are a number of known model based approaches to complex distributed CPS monitoring, but their main difference in comparison with the suggested one is that known approaches by the most part use static models which are to be build manually by experts. It takes a lot of human efforts and often results in errors. Our idea is that automata models of structure and behavior of the observed system are used and both of these models are built and kept in actual state in automatic mode on the basis of log file information. The proposed approach is based, on one hand, on the results of the authors researches in the field of automatic synthesis of multi-level automata models of observed systems and, on the other hand, on well known algorithms of process mining. In the paper typical monitoring tasks are described and generalized algorithms for solving them using the proposed system of models are presented. An example of real life systems based on the suggested approach is given. The approach can be recommended to use for building CPS of medium and high complexity, characterized by high structural dynamics and cognitive behavior.


2020 ◽  
Vol 17 (4) ◽  
pp. 96-104
Author(s):  
A. A. Solodov

The purpose of the research is to develop a generalized structural scheme of organizational and technical systems based on the general theory of management, which contains the necessary and sufficient number of modules and formalize on this basis the main management tasks that act as goals of the behavior of the management object. The main modules that directly implement the management process are the status assessment module of organizational and technical systems and the management module. It is shown that in traditional organizational and technical systems, including the decision-maker, the key module is the state assessment module of organizational and technical systems. In this regard, the key aspect of the work is to study the optimal algorithms for evaluating the state of processes occurring in the organizational and technical systems and develop on this basis the principles of mathematical formalization and algorithmization of the status assessment module. The research method is the application of the principles of the theory of statistical estimates of random processes occurring in the organizational and technical systems against the background of interference and the synthesis of algorithms for the functioning of the status assessment module on this basis. It is shown that a characteristic feature of random processes occurring in organizational and technical systems is their essentially discrete nature and Poisson statistics. A mathematical description of the statistical characteristics of point random processes is formulated, which is suitable for solving the main problems of process evaluation and management in organizational and technical systems. The main results were the definition of state space of the organizational and technical systems, the development of a generalized structural scheme of the organizational and technical systems in state space that includes the modules forming the state variable of the module assessment and module management. This mathematical interpretation of the organizational and technical systems structure allowed us to formalize the main problems solved by typical organizational and technical systems and consider optimal algorithms for solving such problems. The assumption when considering the problems of synthesis of optimal algorithms is to optimize the status assessment module of organizational and technical systems and the control module separately, while the main attention is paid to the consideration of optimal estimation algorithms. The formalization and algorithmization of the organizational and technical systems behavior is undertaken mainly in terms of the Bayesian criterion of optimal statistical estimates. Various methods of overcoming a priori uncertainty typical for the development of real organizational and technical systems are indicated. Methods of adaptation are discussed, including Bayesian adaptation of the decision-making procedure under conditions of a priori uncertainty. Using a special case of the Central limit theorem, an asymptotic statistical relationship between the mentioned point processes and traditional Gaussian processes is established. As an example, a nontrivial problem of optimal detection of Poisson signal against a background of Poisson noise is considered; graphs of the potential noise immunity of this algorithm are calculated and presented. The corresponding references are given to the previously obtained results of estimates of Poisson processes. For automatic organizational and technical systems, the generally accepted criteria for the quality of management of such systems are specified. The result of the review is a classification of methods for formalization and algorithmization of problems describing the behavior of organizational and technical systems.


2019 ◽  
Vol 9 (3) ◽  
pp. 228 ◽  
Author(s):  
AMM Sharif Ullah

This article addresses some fundamental issues of concept mapping relevant to discipline-based education. The focus is on manufacturing knowledge representation from the viewpoints of both human and machine learning. The concept of new-generation manufacturing (Industry 4.0, smart manufacturing, and connected factory) necessitates learning factory (human learning) and human-cyber-physical systems (machine learning). Both learning factory and human-cyber-physical systems require semantic web-embedded dynamic knowledge bases, which are subjected to syntax (machine-to-machine communication), semantics (the meaning of the contents), and pragmatics (the preferences of individuals involved). This article argues that knowledge-aware concept mapping is a solution to create and analyze the semantic web-embedded dynamic knowledge bases for both human and machine learning. Accordingly, this article defines five types of knowledge, namely, analytic a priori knowledge, synthetic a priori knowledge, synthetic a posteriori knowledge, meaningful knowledge, and skeptic knowledge. These types of knowledge help find some rules and guidelines to create and analyze concept maps for the purposes human and machine learning. The presence of these types of knowledge is elucidated using a real-life manufacturing knowledge representation case. Their implications in learning manufacturing knowledge are also described. The outcomes of this article help install knowledge-aware concept maps for discipline-based education.


2020 ◽  
pp. 65-72
Author(s):  
V. V. Savchenko ◽  
A. V. Savchenko

This paper is devoted to the presence of distortions in a speech signal transmitted over a communication channel to a biometric system during voice-based remote identification. We propose to preliminary correct the frequency spectrum of the received signal based on the pre-distortion principle. Taking into account a priori uncertainty, a new information indicator of speech signal distortions and a method for measuring it in conditions of small samples of observations are proposed. An example of fast practical implementation of the method based on a parametric spectral analysis algorithm is considered. Experimental results of our approach are provided for three different versions of communication channel. It is shown that the usage of the proposed method makes it possible to transform the initially distorted speech signal into compliance on the registered voice template by using acceptable information discrimination criterion. It is demonstrated that our approach may be used in existing biometric systems and technologies of speaker identification.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


1999 ◽  
Vol 53 (9-10) ◽  
pp. 1-10
Author(s):  
V. A. Omel'chenko ◽  
V. V. Balabanov ◽  
B. M. Bezruk ◽  
Yu. N. Goloborod'ko

Sign in / Sign up

Export Citation Format

Share Document