首页 > 最新文献

2012 5th International Symposium on Resilient Control Systems最新文献

英文 中文
Simulation and human factors in modeling of spaceflight mission control teams 航天飞行任务控制团队建模中的仿真与人为因素
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309288
B. Caldwell, J. Onken
This paper describes a recently completed project to develop a human factors informed simulation of team-based expert coordination and knowledge sharing tasks in a complex and resilient control system. The project explores processes of anomaly response in NASA spaceflight mission control teams, using as a baseline example the mission profile and anomalies experienced during the final Space Shuttle flight, STS-135. While controllers in this simulation work to detect and resolve anomalies using technical decision criteria, their performance is subject to stochastic and non-rational dynamics of information availability and flow affecting situation awareness and hypothesis generation. The initial goal of this work is to assist in analysis of alternatives for future mission control room designs, and to develop increased simulation capability in the area of distributed expertise and problem solving in teams.
本文描述了最近完成的一个项目,该项目开发了一个复杂和弹性控制系统中基于团队的专家协调和知识共享任务的人为因素知情模拟。该项目探讨了NASA航天飞行任务控制团队的异常响应过程,以最后一次航天飞机飞行STS-135期间的任务概况和异常为基准。虽然控制器在该仿真中使用技术决策准则来检测和解决异常,但它们的性能受到影响态势感知和假设生成的信息可用性和流量的随机和非理性动态的影响。这项工作的最初目标是协助分析未来任务控制室设计的备选方案,并在分布式专业知识和团队解决问题方面发展增加的模拟能力。
{"title":"Simulation and human factors in modeling of spaceflight mission control teams","authors":"B. Caldwell, J. Onken","doi":"10.1109/ISRCS.2012.6309288","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309288","url":null,"abstract":"This paper describes a recently completed project to develop a human factors informed simulation of team-based expert coordination and knowledge sharing tasks in a complex and resilient control system. The project explores processes of anomaly response in NASA spaceflight mission control teams, using as a baseline example the mission profile and anomalies experienced during the final Space Shuttle flight, STS-135. While controllers in this simulation work to detect and resolve anomalies using technical decision criteria, their performance is subject to stochastic and non-rational dynamics of information availability and flow affecting situation awareness and hypothesis generation. The initial goal of this work is to assist in analysis of alternatives for future mission control room designs, and to develop increased simulation capability in the area of distributed expertise and problem solving in teams.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WESBES: A wireless embedded sensor for improving human comfort metrics using temporospatially correlated data WESBES:一种无线嵌入式传感器,用于利用时空相关数据改善人体舒适度
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309289
J. Hewlett, Milos Manic, C. Rieger
When utilized properly, energy management systems (EMS) can offer significant energy savings by optimizing the efficiency of heating, ventilation, and air-conditioning (HVAC) systems. However, difficulty often arises due to the constraints imposed by the need to maintain an acceptable level of comfort for a building's occupants. This challenge is compounded by the fact that human comfort is difficult to define in a measurable way. One way to address this problem is to provide a building manager with direct feedback from the building's users. Still, this data is relative in nature, making it difficult to determine the actions that need to be taken, and while some useful comfort correlations have been devised, such as ASHRAE's Predicted Mean Vote index, they are rules of thumb that do not connect individual feedback with direct, diverse feedback sensing. As they are a correlation, quantifying effects of climate, age of buildings and associated defects such as draftiness, are outside the realm of this correlation. Therefore, the contribution of this paper is the Wireless Embedded Smart Block for Environment Sensing (WESBES); an affordable wireless sensor platform that allows subjective human comfort data to be directly paired with temporospatially correlated objective sensor measurements for use in EMS. The described device offers a flexible research platform for analyzing the relationship between objective and subjective occupant feedback in order to formulate more meaningful measures of human comfort. It could also offer an affordable and expandable option for real world deployment in existing EMS.
如果使用得当,能源管理系统(EMS)可以通过优化供暖、通风和空调(HVAC)系统的效率来节省大量能源。然而,由于需要为建筑物的居住者保持可接受的舒适水平而施加的限制,困难经常出现。人类的舒适度很难用一种可测量的方式来定义,这一事实使这一挑战更加复杂。解决这个问题的一种方法是向建筑物管理员提供建筑物用户的直接反馈。尽管如此,这些数据在本质上是相对的,使得决定需要采取的行动变得困难,虽然已经设计了一些有用的舒适相关性,例如ASHRAE的预测平均投票指数,但它们是经验法则,不能将个人反馈与直接的,多样化的反馈感知联系起来。因为它们是相关的,量化气候的影响,建筑的年龄和相关的缺陷,如通风,不在这种相关的范围之内。因此,本文的贡献是无线嵌入式智能块环境感知(WESBES);这是一种价格合理的无线传感器平台,可以将主观的人体舒适度数据与时空相关的客观传感器测量结果直接配对,用于EMS。所描述的设备提供了一个灵活的研究平台,用于分析客观和主观乘员反馈之间的关系,以便制定更有意义的人类舒适度措施。它还可以为现有EMS中的实际部署提供负担得起且可扩展的选项。
{"title":"WESBES: A wireless embedded sensor for improving human comfort metrics using temporospatially correlated data","authors":"J. Hewlett, Milos Manic, C. Rieger","doi":"10.1109/ISRCS.2012.6309289","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309289","url":null,"abstract":"When utilized properly, energy management systems (EMS) can offer significant energy savings by optimizing the efficiency of heating, ventilation, and air-conditioning (HVAC) systems. However, difficulty often arises due to the constraints imposed by the need to maintain an acceptable level of comfort for a building's occupants. This challenge is compounded by the fact that human comfort is difficult to define in a measurable way. One way to address this problem is to provide a building manager with direct feedback from the building's users. Still, this data is relative in nature, making it difficult to determine the actions that need to be taken, and while some useful comfort correlations have been devised, such as ASHRAE's Predicted Mean Vote index, they are rules of thumb that do not connect individual feedback with direct, diverse feedback sensing. As they are a correlation, quantifying effects of climate, age of buildings and associated defects such as draftiness, are outside the realm of this correlation. Therefore, the contribution of this paper is the Wireless Embedded Smart Block for Environment Sensing (WESBES); an affordable wireless sensor platform that allows subjective human comfort data to be directly paired with temporospatially correlated objective sensor measurements for use in EMS. The described device offers a flexible research platform for analyzing the relationship between objective and subjective occupant feedback in order to formulate more meaningful measures of human comfort. It could also offer an affordable and expandable option for real world deployment in existing EMS.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122094731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An integrated system simulation approach for wireless networked control systems 无线网络控制系统的集成系统仿真方法
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309304
P. Horváth, M. Yampolskiy, Yuan Xue, X. Koutsoukos, J. Sztipanovits
Cyber-Physical Systems (CPS), such as networked control systems, are increasingly deployed over wireless networks. Given the sensitivity of control systems to networking conditions such as packet drops, delays and jitters, it is important to verify and evaluate the control system properties under realistic wireless networking deployment scenarios. However, current research is often based on simplistic models of the wireless network physical layer behaviors. In this paper, we point out deficiencies in the existing simulation methods for the performance evaluation of wireless networked control systems and present a novel simulation framework for wireless network control systems. Our approach aims at capturing the effects in the physical layer more accurately than state-of-art simulators are capable of. An integrated simulation tool, based on open-source solutions, is presented and a case study of a networked control system is also provided to illustrate the capabilities of our simulation tool.
网络物理系统(CPS),如网络化控制系统,越来越多地部署在无线网络上。考虑到控制系统对网络条件(如丢包、延迟和抖动)的敏感性,在现实的无线网络部署场景下验证和评估控制系统的特性非常重要。然而,目前的研究往往是基于无线网络物理层行为的简单模型。本文指出了现有无线网络控制系统性能评估仿真方法的不足,提出了一种新的无线网络控制系统仿真框架。我们的方法旨在比最先进的模拟器更准确地捕捉物理层的效果。提出了一个基于开源解决方案的集成仿真工具,并提供了一个网络控制系统的案例研究来说明我们的仿真工具的功能。
{"title":"An integrated system simulation approach for wireless networked control systems","authors":"P. Horváth, M. Yampolskiy, Yuan Xue, X. Koutsoukos, J. Sztipanovits","doi":"10.1109/ISRCS.2012.6309304","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309304","url":null,"abstract":"Cyber-Physical Systems (CPS), such as networked control systems, are increasingly deployed over wireless networks. Given the sensitivity of control systems to networking conditions such as packet drops, delays and jitters, it is important to verify and evaluate the control system properties under realistic wireless networking deployment scenarios. However, current research is often based on simplistic models of the wireless network physical layer behaviors. In this paper, we point out deficiencies in the existing simulation methods for the performance evaluation of wireless networked control systems and present a novel simulation framework for wireless network control systems. Our approach aims at capturing the effects in the physical layer more accurately than state-of-art simulators are capable of. An integrated simulation tool, based on open-source solutions, is presented and a case study of a networked control system is also provided to illustrate the capabilities of our simulation tool.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid 使用混合攻击图来模拟智能电网中的网络物理攻击
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309311
P. Hawrylak, M. Haney, M. Papa, John Hale
The Smart Grid is a large networked cyber-physical control system that is part of the critical infrastructure. This paper presents a cyber-physical attack against a substation where the attacker causes a transformer to overheat. The attack is modeled using a hybrid attack graph (HAG), which provides a means to model both the physical and cyber components of the attack. The HAG provides insight into potential attack vectors. Based on this information, key points in the system can be identified where security can be strengthened. Direction for future work to expand the capabilities of HAGs for modeling cyber-physical attacks is presented.
智能电网是一个大型网络物理控制系统,是关键基础设施的一部分。本文提出了一种针对变电站的网络物理攻击,攻击者导致变压器过热。使用混合攻击图(HAG)对攻击进行建模,这提供了一种对攻击的物理和网络组件进行建模的方法。HAG提供了对潜在攻击向量的洞察。基于这些信息,可以识别系统中可以加强安全性的关键点。提出了未来工作的方向,以扩展hag对网络物理攻击建模的能力。
{"title":"Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid","authors":"P. Hawrylak, M. Haney, M. Papa, John Hale","doi":"10.1109/ISRCS.2012.6309311","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309311","url":null,"abstract":"The Smart Grid is a large networked cyber-physical control system that is part of the critical infrastructure. This paper presents a cyber-physical attack against a substation where the attacker causes a transformer to overheat. The attack is modeled using a hybrid attack graph (HAG), which provides a means to model both the physical and cyber components of the attack. The HAG provides insight into potential attack vectors. Based on this information, key points in the system can be identified where security can be strengthened. Direction for future work to expand the capabilities of HAGs for modeling cyber-physical attacks is presented.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131813467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Musings on persistent excitation prompts new weighted least squares SysID method for nonlinear differential equation based systems 对持续激励的思考,提出了一种新的基于非线性微分方程系统的加权最小二乘SysID方法
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309298
C. Tolle
The Control community relies heavily on good System Identification (SysID) for finding the plant models needed to develop a good controller. However over time the SysID process and controller development process have remained generally separate activities. One reason for this is that SysID and Control are disparate in their fundamental nature. For good SysID, one is faced with the challenge of persistently exciting plant dynamics; while a good control system attempts to constrain or suppress much of a plant's natural dynamics with desired dynamics. It is this inherent conflict that separates the two practices. But for many plants, their inherent instabilities makes trajectory collection difficult, thus there is a desire to perform data collection while under some simple form of control. Nevertheless, in order to perform solid SysID one must sample the very dynamics one might need to suppress; how then can this be achieved? This paper will explore the notation of persistent excitation, its relationship to phase space trajectories, and how one might recover the most nonlinear dynamics information for SysID while remaining under the linearizing based control region - the very place that those dynamics are most suppressed.
控制社区在很大程度上依赖于良好的系统识别(SysID)来寻找开发良好控制器所需的工厂模型。然而,随着时间的推移,SysID过程和控制器开发过程通常保持独立的活动。其中一个原因是SysID和Control在其基本性质上是不同的。对于SysID来说,人们面临着持续令人兴奋的植物动态的挑战;而一个好的控制系统试图用期望的动态来约束或抑制植物的自然动态。正是这种内在的冲突将这两种做法分开。但对于许多植物来说,它们固有的不稳定性使得轨迹收集变得困难,因此人们希望在某种简单的控制形式下进行数据收集。然而,为了执行可靠的SysID,必须对可能需要抑制的动态进行采样;那么如何才能做到这一点呢?本文将探讨持续激励的符号,它与相空间轨迹的关系,以及如何恢复SysID的最非线性动力学信息,同时保持在基于线性化的控制区域下-这些动力学最受抑制的地方。
{"title":"Musings on persistent excitation prompts new weighted least squares SysID method for nonlinear differential equation based systems","authors":"C. Tolle","doi":"10.1109/ISRCS.2012.6309298","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309298","url":null,"abstract":"The Control community relies heavily on good System Identification (SysID) for finding the plant models needed to develop a good controller. However over time the SysID process and controller development process have remained generally separate activities. One reason for this is that SysID and Control are disparate in their fundamental nature. For good SysID, one is faced with the challenge of persistently exciting plant dynamics; while a good control system attempts to constrain or suppress much of a plant's natural dynamics with desired dynamics. It is this inherent conflict that separates the two practices. But for many plants, their inherent instabilities makes trajectory collection difficult, thus there is a desire to perform data collection while under some simple form of control. Nevertheless, in order to perform solid SysID one must sample the very dynamics one might need to suppress; how then can this be achieved? This paper will explore the notation of persistent excitation, its relationship to phase space trajectories, and how one might recover the most nonlinear dynamics information for SysID while remaining under the linearizing based control region - the very place that those dynamics are most suppressed.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving cyber-security of smart grid systems via anomaly detection and linguistic domain knowledge 通过异常检测和语言领域知识提高智能电网系统的网络安全
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309292
O. Linda, M. Manic, T. Vollmer
The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this paper. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies a previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. In addition, an Interval Type-2 Fuzzy Logic System (IT2 FLS) is used to model human background knowledge about the network system and to dynamically adjust the sensitivity threshold of the anomaly detection algorithms. The IT2 FLS was used to model the linguistic uncertainty in describing the relationship between various network communication attributes and the possibility of a cyber attack. The proposed method was tested on an experimental smart grid system demonstrating enhanced cyber-security.
计划大规模部署的智能电网网络设备将产生大量的信息在各种类型的通信网络上交换。这些关键系统的实施需要适当的网络安全措施。本文提出了一种网络异常检测方案。在常见的网络体系结构中,多个通信流同时存在,这使得为整个系统构建异常检测解决方案变得困难。此外,常见的异常检测算法需要指定一个灵敏度阈值,这不可避免地导致假阳性和假阴性率之间的权衡。为了解决这些问题,本文提出了一种新的异常检测体系结构。设计的系统将先前开发的网络安全网络传感器方法应用于单个选定的通信流,允许学习准确的正常网络行为模型。此外,利用区间2型模糊逻辑系统(IT2 FLS)对网络系统的人类背景知识进行建模,并动态调整异常检测算法的灵敏度阈值。在描述各种网络通信属性与网络攻击可能性之间的关系时,使用IT2 FLS对语言不确定性进行建模。在实验智能电网系统上对该方法进行了测试,验证了该方法增强了网络安全性。
{"title":"Improving cyber-security of smart grid systems via anomaly detection and linguistic domain knowledge","authors":"O. Linda, M. Manic, T. Vollmer","doi":"10.1109/ISRCS.2012.6309292","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309292","url":null,"abstract":"The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this paper. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies a previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. In addition, an Interval Type-2 Fuzzy Logic System (IT2 FLS) is used to model human background knowledge about the network system and to dynamically adjust the sensitivity threshold of the anomaly detection algorithms. The IT2 FLS was used to model the linguistic uncertainty in describing the relationship between various network communication attributes and the possibility of a cyber attack. The proposed method was tested on an experimental smart grid system demonstrating enhanced cyber-security.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121993995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A case for validating remote application integrity for data processing systems 验证数据处理系统的远程应用程序完整性的案例
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309313
Jonathan M. Chu, Mirko Montanari, R. Campbell
There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.
近年来,从电网传输到在线系统的数据量有了很大的增长。随着越来越多的智能电表被安装到AMI(高级计量基础设施)中,需要减轻收集系统中潜在的安全威胁。攻击者可能会采取多种攻击向量来破坏用户数据的机密性,开发人员可能需要花费大量时间和精力来安全地覆盖所有这些攻击向量。在本文中,我们分析了AMI系统的体系结构以及数据如何从一端移动到另一端。特别地,我们讨论了在防止信息泄露的安全程序验证方面进行更多研究的必要性。当程序未按预期执行,可能泄露机密信息或采取意外操作时,就会出现安全问题。我们讨论了一个可以利用这种安全程序验证的理论网络架构。该模型通过将数据包含在一个我们称为DBPC(数据库处理中心)的安全位置,而不是通过传统的DBMS(数据库管理系统)将数据传输到多个位置,从而最大限度地减少了攻击向量。当外部各方希望访问数据时,他们可以将经过验证的安全应用程序发送到DBPC,以便在不直接访问数据的情况下远程运行他们的应用程序。介绍了实现的AMI仿真器和DBPC原型模块的设计。
{"title":"A case for validating remote application integrity for data processing systems","authors":"Jonathan M. Chu, Mirko Montanari, R. Campbell","doi":"10.1109/ISRCS.2012.6309313","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309313","url":null,"abstract":"There has been a great increase in recent years as to the amount of data from the grid that has been going to online systems. As more smart meters get installed into the AMI(advanced metering infrastructure), there is a need to mitigate the potential security threats in the collection system. There are a multitude of attack vectors that an adversary may take to compromise the confidentiality of user data and it may take much time and effort for developers to securely cover all such attack vectors. In this paper, we analyze the architecture of AMI systems and how data moves from one end to the other. In particular, we discuss the need for more research in safe program validation that protects against information leaks. Security problems can arise when programs do not perform as intended and may reveal confidential information or take unexpected actions. We discuss a theoretical network architecture that could take advantage of such secure program validation. The model minimizes attack vectors by containing data in one secure location that we call a DBPC(database processing center) instead of transporting data to multiple locations through a traditional DBMS(database management system). When outside parties want access to the data, they can send verified secure applications to the DBPC to run their applications remotely without direct access to the data. We describe the design of the AMI simulator and DBPC prototype module that we implemented.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proposed data fusion architecture for micro-zone analysis and data mining 一种用于微区分析和数据挖掘的数据融合体系结构
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309296
K. McCarty, Milos Manic
Micro-zone analysis involves use of data fusion and data mining techniques in order to understand the relative impact of many different variables. Data Fusion requires the ability to combine or “fuse” date from multiple data sources. Data mining involves the application of sophisticated algorithms such as Neural Networks and Decision Trees, to describe micro-zone behavior and predict future values based upon past values. One of the difficulties encountered in developing generic time series or other data mining techniques for micro-zone analysis is the wide variability of the data sets available for analysis. This presents challenges all the way from the data gathering stage to results presentation. This paper presents an architecture designed and used to facilitate the collection of disparate data sets well suited for data fusion and data mining. Results show this architecture provides a flexible, dynamic framework for the capture and storage of a myriad of dissimilar data sets and can serve as a foundation from which to build a complete data fusion architecture.
微区分析涉及使用数据融合和数据挖掘技术,以便了解许多不同变量的相对影响。数据融合需要能够组合或“融合”来自多个数据源的数据。数据挖掘涉及神经网络和决策树等复杂算法的应用,以描述微区域行为并根据过去的值预测未来的值。在开发用于微区分析的一般时间序列或其他数据挖掘技术时遇到的困难之一是可供分析的数据集具有很大的可变性。这给从数据收集阶段到结果展示的整个过程带来了挑战。本文提出了一种体系结构,用于促进不同数据集的收集,非常适合于数据融合和数据挖掘。结果表明,该体系结构为捕获和存储大量不同的数据集提供了灵活、动态的框架,并可作为构建完整数据融合体系结构的基础。
{"title":"A proposed data fusion architecture for micro-zone analysis and data mining","authors":"K. McCarty, Milos Manic","doi":"10.1109/ISRCS.2012.6309296","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309296","url":null,"abstract":"Micro-zone analysis involves use of data fusion and data mining techniques in order to understand the relative impact of many different variables. Data Fusion requires the ability to combine or “fuse” date from multiple data sources. Data mining involves the application of sophisticated algorithms such as Neural Networks and Decision Trees, to describe micro-zone behavior and predict future values based upon past values. One of the difficulties encountered in developing generic time series or other data mining techniques for micro-zone analysis is the wide variability of the data sets available for analysis. This presents challenges all the way from the data gathering stage to results presentation. This paper presents an architecture designed and used to facilitate the collection of disparate data sets well suited for data fusion and data mining. Results show this architecture provides a flexible, dynamic framework for the capture and storage of a myriad of dissimilar data sets and can serve as a foundation from which to build a complete data fusion architecture.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational intelligence based anomaly detection for Building Energy Management Systems 基于计算智能的建筑能源管理系统异常检测
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309297
O. Linda, Dumidu Wijayasekara, Milos Manic, C. Rieger
In the past several decades Building Energy Management Systems (BEMSs) have become vital components of most modern buildings. BEMSs utilize advanced microprocessor technology combined with extensive sensor data collection and communication to minimize energy consumption while maintaining high human comfort levels. When properly tuned and operated, BEMSs can provide significant energy savings. However, the complexity of the acquired sensory data and the overwhelming amount of presented information renders them difficult to adjust or even understand by responsible building managers. This inevitably results in suboptimal BEMS operation and performance. To address this issue, this paper reports on a research effort that utilizes Computational Intelligence techniques to fuse multiple heterogeneous sources of BEMS data and to extract relevant actionable information. This actionable information can then be easily understood and acted upon by responsible building managers. In particular, this paper describes the use of anomaly detection algorithms for improving the understandability of BEMS data and for increasing the state-awareness of building managers. The developed system utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to automatically build a model of normal BEMS operations and detect possible anomalous behavior. In addition, linguistic summaries based on fuzzy set representation of the input values are generated for the detected anomalies which increase the understandability of the presented results.
在过去的几十年里,建筑能源管理系统(BEMSs)已经成为大多数现代建筑的重要组成部分。BEMSs利用先进的微处理器技术,结合广泛的传感器数据收集和通信,在保持高人体舒适度的同时,最大限度地减少能源消耗。当适当地调整和操作时,BEMSs可以提供显著的能源节约。然而,所获得的感官数据的复杂性和所呈现的信息的压倒性数量使它们难以调整,甚至难以被负责任的建筑管理人员理解。这不可避免地导致BEMS操作和性能不理想。为了解决这个问题,本文报告了一项利用计算智能技术融合多个异构BEMS数据源并提取相关可操作信息的研究工作。然后,这些可操作的信息可以很容易地被理解,并由负责任的建筑管理人员采取行动。特别地,本文描述了异常检测算法的使用,以提高BEMS数据的可理解性,并增加建筑管理人员的状态意识。该系统利用改进的最近邻聚类算法和模糊逻辑规则提取技术,自动建立BEMS正常运行模型,并检测可能的异常行为。此外,对检测到的异常生成基于输入值模糊集表示的语言摘要,提高了呈现结果的可理解性。
{"title":"Computational intelligence based anomaly detection for Building Energy Management Systems","authors":"O. Linda, Dumidu Wijayasekara, Milos Manic, C. Rieger","doi":"10.1109/ISRCS.2012.6309297","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309297","url":null,"abstract":"In the past several decades Building Energy Management Systems (BEMSs) have become vital components of most modern buildings. BEMSs utilize advanced microprocessor technology combined with extensive sensor data collection and communication to minimize energy consumption while maintaining high human comfort levels. When properly tuned and operated, BEMSs can provide significant energy savings. However, the complexity of the acquired sensory data and the overwhelming amount of presented information renders them difficult to adjust or even understand by responsible building managers. This inevitably results in suboptimal BEMS operation and performance. To address this issue, this paper reports on a research effort that utilizes Computational Intelligence techniques to fuse multiple heterogeneous sources of BEMS data and to extract relevant actionable information. This actionable information can then be easily understood and acted upon by responsible building managers. In particular, this paper describes the use of anomaly detection algorithms for improving the understandability of BEMS data and for increasing the state-awareness of building managers. The developed system utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to automatically build a model of normal BEMS operations and detect possible anomalous behavior. In addition, linguistic summaries based on fuzzy set representation of the input values are generated for the detected anomalies which increase the understandability of the presented results.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2012 5th International Symposium on Resilient Control Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1