49
Applied Computational Intelligence Lab & Trustworthy Syst University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities Applied Mathematics for Deregulated Electric Power Systems: Optimization, Control, and Computational Intelligence Crystal City, November 2003 Donald Wunsch, ACIL Director Ann Miller, TSL Director

Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Embed Size (px)

Citation preview

Page 1: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Applied Computational Intelligence Lab & Trustworthy Systems Lab

University of Missouri - Rolla

Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Applied Mathematics for Deregulated Electric Power Systems:

Optimization, Control, and Computational IntelligenceCrystal City, November 2003

Donald Wunsch, ACIL DirectorAnn Miller, TSL Director

Page 2: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Acknowledgements

Funding– NSF– Sandia– Boeing– MK Finley Professorship– Cindy Tang Professorship

Senior Personnel– Ganesh Kumar

Venayagamoorthy– Ron Harley– Daryl Beetner– Danil Prokhorov– Raonak Uz-Zaman– Frank Harary

Personnel – Narayan Vishwanathan– Amit Agarwahl– Sam Mulder– Wenxin Liu– Nian Zhang– Alexander Novokhodko– Xindi Cai– Rohit Dua– Hu Xiao– Rui Xu– Brian Blaha– Paul Pigg– Arvind Rapka Nath– Qiang Yao– Kevin Bollum– Anjaya Shrestra– Karthik Balasubramanian– Pinar Demircan– Daniel Treat– Ian Downard– Eyad Salah Tagiedin– Ganesh Sridharan– Jason White– Krishnaprasad Balasubramanian– Dayle Majors– Nartaj Lakshminarasimhan– Siddarth Panchal– Robert Wayne Denier– Tongquan Wei– Jimish Doshi– Ravikiran Sharda

Page 3: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

“system of systems”– Grown/evolved by adding components not

initially designed to be part of the system– Interdependencies not easily identified

Potential for cascading failures Potential for hidden robustness

Systems of Systems: Interdependencies

Page 4: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Trustworthiness Testing Market Demands Complexity Safety Life-Cycle Model Integration

Issues in Systems ofSystems

Page 5: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

19841984 8686 9090 9292 9494 9696 199819988888

11

1010

100100

Re

co

mm

end

ed

dis

k s

pa

ce,

MB

Math package 1Math package 2Math package 3

Moore

’s L

aw

Source: IEEE Spectrum, January 1998

Complexity: Software Size Growth

Page 6: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Complexity: Software Size Growth

Page 7: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Complexity: Interdependencies

A graph representing almost 6 million lines of computer code. The graph contains approximately 33 thousand nodes and 34 thousand relations.

Source: NATO Report on Visualization, 1999.

Page 8: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Memory managementFile directory Access

I/O PrimitivesProcess Primitives

Process environmentMemory managementFile directory Access

I/O PrimitivesProcess Primitives

Process environmentMemory managementFile directory Access

I/O PrimitivesProcess Primitives

Process environmentMemory managementFile directory Access

I/O PrimitivesProcess Primitives

Process environment

Normalised Failure Rate, %0 5 10 15 20 25 30

LINUX

NT

Win-2000

Win-CE

Failure Rates – System Calls

(Source: Carnegie Mellon, CS Dept.)

Page 9: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Cascading failures Opportunities for errors Control, Communication, IT

– Pres. Commission on Critical Infrastructure Protection

– Particularly EMS & SCADA

Voltage Collapse

Effects of Complexity and Growth

Page 10: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

High-Consequence

Even brief – expensive– Circuit fab: 20 min = ($30 M)

Recent large disruption caused deaths

Backups no guarantee– Well-known in software safety circles

Therac 25 classic example

Page 11: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

At 0903 CST on 18 December 1997, at the Olathe (Kansas City) Air Route Traffic Control Center, a technician routed power through half of the redundant uninterruptible power system, preparatory to performing the annual preventive maintenance on the other half. Apparently the wrong board was pulled.

Complexity: Ripple Effect Example

Page 12: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Results: – Power only out for 4 minutes– Radar and communications working within 17

minutes– However, at least 300 planes were in the Olathe-

controlled airspace; domino effect: hundreds of flights canceled, diverted, or delayed with problems well into the evening.

Complexity: Ripple Effect Example

Page 13: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Not only did the Air Route Traffic Control Center have redundant systems, there were also standby generators and emergency batteries.

Yet, that December morning, these back-up systems were bypassed.

Why?

Back-up Systems Are Not a Guarantee

Page 14: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

The back-up systems were bypassed because the system was in a maintenance state.

This particular combination of inputs was not anticipated to occur when the system was in maintenance mode.

Complex Interactions: States and Inputs

Page 15: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Tempting Target

Dramatic growth in number of knowledgeable experts

Potential to insert incorrect data or Denial of Service attacks

High leverage / low risk

Page 16: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Computational Intelligence Tools Can Help

Neural Net Intrusion Detection ADP Robust Controls Combinatorial Optimization for

reconfigurability

Page 17: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Intrusion Detection with Neural Nets

RBFNs can be used for misuse and anomaly detection using sequences of system calls

Data are obtained from 1998 DARPA Intrusion Detection Evaluation program

Also collaboration with Sandia Red Team

Page 18: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

False positives

Tru

e p

osi

tive

s

accuracy=0.74

RBFNN Generalization on unknown test data

Page 19: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

PNN + ADABOOST

Page 20: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Multi-Machine Power System Control

Page 21: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

G1 G2

G3

1 2

3

4 5

900 KmExciter

AVR Vref2

Exciter

AVR

Vref1

Ve1 Ve2Vt1 Vt2

900 Km

900 Km

Pref1

1Governor Governor

Turbine Turbine

2

Pref2

Multi-Machine Power System with Conventional Controllers

Page 22: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Multi-Machine Power System with DHP Neurocontrollers

G1 G2

G3

1 2

3

4 5

900 KmExciter

Vref2

Exciter

Vref1

Vf1 Vf2Vt1

Vt2

900 Km

900 Km

Pref1

1

Turbine Turbine

2

Pref2

Neurocontoller

TDL TDL

P1

Neurocontoller

TDL TDL

P2

Vref1 Vref2

GovernorGovernor

Page 23: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

DHP Critic Network Adaptation

PLANTTDL

ACTIONNeural

NetworkMODELNeural

Network

CRITICNeural

Network

CRITICNeural

Network

TDL

MODELNeural

Network

YrefY(t)

A(t))(

)(

tA

tU

(t+1)

)(^

1tY

)(^

tY

)(^

1tY

TDL

TDL

)(^

tY

)(^

1tY TDL

TDL )(^

2tY

++

)(

)(

)(

^1tY

1tJ

1t

)(

)(

)(

^1tY

1tJ

1t

)(

)(

tY

tU

+---

EC2(t)

Page 24: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Terminal Voltage of Generator G2 for a 5% Step Change in its Desired Terminal

Voltage & Operating Point Changed

1 2 3 4 5 6 7 80.98

0.99

1

1.01

1.02

1.03

1.04

1.05

1.06

1.07

1.08

Time in seconds

Ter

min

al v

olta

ge in

pu

DHP

AVR

Page 25: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Speed Deviation of Generator G2 - Operating Point Changed

0 1 2 3 4 5 6 7 8-1.5

-1

-0.5

0

0.5

1

1.5x 10

-3

Time in seconds

Sp

ee

d d

evi

atio

n o

f G

1 in

pu

Conventional

Neurocontroller

Page 26: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Traveling Salesman Problem

Great benchmark NP – complete

– Maps to other NP – complete problems Public databases

Big need – get learning capability of NN without brittleness of other techniques.

Page 27: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Paper Method Largest

Instance

Quality

(percent

excess over

optimal )

Test bed

[11] 1st 100 14.6% NS

[13] 1st 100 14% NS

[10] 1st 400 NR NS

[5] 2nd 532 6.8% TSPLIB

[12] 1st 1000 NR NS

[16] 2nd 1000 NR NS

[15] 1st 2392 5% TSPLIB

[17] 2nd 2392 9% TSPLIB

[2] 1st 10000 NR NS

[4] 1st 11849 17.4% TSPLIB

Previous contributions -- disappointing

Page 28: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Clustered Traveling Salesman

Divide problem into clusters using ART in O(n)

Use Lin-Kernighan algorithm for global tour

Use Lin-Kernighan algorithm for local tours

Merge local tours in O(n) time Global operations limited to O(n) time

Page 29: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Algorithm Overview

Read problem from file O(n)

ART O(n lg n)

cluster

cluster

cluster

LK O(k2.2)

LK O(k2.2)

LK O(k2.2)

Merge Clusters O(n)

Result

Page 30: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Implemented in C++ thread-safe code Uses Windows threads for parallelism Operating System-specific code isolated to one

file Should be easy to port to other parallel

systems

Implementation

Page 31: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

#cities Tour Length 1P Time 2P Time Vig factor % off Speedup 1000 2.58E+07 0.422 0.281 0.7 10.40% 1.50

2000 3.61E+07 1.031 0.672 0.7 10.64% 1.53

8000 7.14E+07 8.328 4.281 0.72 10.97% 1.95

10000 7.97E+07 11.359 7.297 0.75 10.57% 1.56

20000 1.12E+08 24.641 14.406 0.8 10.53% 1.71

250000 4.00E+08 315.078 209.687 0.92 11.64% 1.50

1000000 7.94E+08 1468.165 986.48 0.97 11.03% 1.49

10000000 2.52E+09 10528.7 0.98 1.27%

CONCORDE

1000 2.34E+07 1.670

2000 3.26E+07 3.500

8000 6.43E+07 26.570

10000 7.20E+07 37.620

20000 1.01E+08 84.830

250000 3.58E+08 1379.540

1000000 7.15E+08 9013.53 10000000 2.495E+09 43630.7

Page 32: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

1k

Page 33: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

4k

Page 34: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

8k

Page 35: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

10k

Page 36: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

20k

Page 37: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

50k

Page 38: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

85k

Page 39: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

150k

Page 40: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

250k

Page 41: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

1 M

Page 42: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Even better news…

Continued Scaling Results Parallelizability Memory Management

Page 43: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

BUT – To Move Beyond

Clear Need for more advanced architectures– Especially to Learn from

Experience Cellular Structures necessary Same with SRNs Therefore, combine them and

ACDs

Page 44: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Recurrent Nets

Obviously achieve dynamic behaviors Possible similarity to adaptive systems

but with fixed parameters Simultaneous recurrent nets particularly

challenging, esp. architectures

Page 45: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

            

            

 

•Graph Theoretic Representation

•SRN Necessary (Werbos & Pang, ’96 & ’98)

•Cellular structure – scaling

•Closed form now

•Convergence time now

•Importance of design principles

Generalized Maze Problem

Page 46: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Require for the output node: x16 = (x2 / x1)[min{x6, x5, x4, x3} + 1].

This is a known SRN!

Design from output backward

Page 47: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Output J = (x2/x1) * sum = x16(a,b)

CurrentNode inputs Neighbor

node inputs

Feedback inputs

             

 

(Occurs at each node (a,b) in maze.)

Product Nodes

+1

/ *

Cellular SRN Structure Complete

Page 48: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Analyze worst-case convergence

       

 

WCT = N2 - 2N + N - 3 = N2 - N - 3.

Also true for N x N maze by simple induction proof.

Note that this is convergence in J steps.

Page 49: Applied Computational Intelligence Lab & Trustworthy Systems Lab University of Missouri - Rolla Systems of Systems: Cybersecurity Vulnerabilities and Opportunities

Conclusions

Power networks inherit the full range of “systems of systems” issues.

These are amenable to computational intelligence solutions:– Detection– Robust Control– Reconfigurability

Combinatorial Optimization