Using Learned Models for the Root Cause Analysis of Cyber-Physical Production Systems

نویسندگان

  • Oliver Niggemann
  • Stefan Windmann
  • Sören Volgmann
  • Andreas Bunte
  • Benno Stein
چکیده

The diagnosis of Cyber-Physical Production Systems (CPPS) comprises two main steps: (i) The identification of anomalous system behavior und (ii) the deduction of the underlying root cause. While step (i) requires only models of the OKbehavior of the system, step (ii) requires models that can predict the system behavior in OK and especially in fault situations. Over the last years, the question where such models originate has become a major research topic—due to the highly adaptable nature of CPPS which renders a manual modeling infeasible. Because of the infeasibility of manual modeling, algorithms have been developed for step (i) which learn an OK-model based on system observations. Theoretically, also fault models for step (ii) could be learned, but practically we incur a dilemma since fault events occur too seldom to learn a fault model from them. This paper introduces the new algorithm MoSDA which shows a way out of this dilemma. MoSDA does not use fault models but extracts more information from learned OK-models than previous algorithms: The main idea is to go from easy-computable anomalies on the system level to hard-computable anomalies on the component level. In practice, efficient heuristics for the deduction of root causes can be given if anomalies are known on a component level while a root cause analysis is hard if anomalies are only known on a system level.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable Anomaly Detection and Isolation in Cyber-physical Systems Using Bayesian Networks

Anomalies in cyber-physical systems may arise due to malicious cyber attacks or operational faults in the physical devices. Accurately detecting the anomalies and isolating their root-causes is important for identifying appropriate reactive and preventive measures and building resilient cyber-physical systems. Anomaly detection and isolation in cyber-physical systems is challenging, because the...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Root-cause analysis for time-series anomalies via spatiotemporal causal graphical modeling

Modern distributed cyber-physical systems encounter a large variety of anomalies and in many cases, they are vulnerable to catastrophic fault propagation scenarios due to strong connectivity among the sub-systems. In this regard, root-cause analysis becomes highly intractable due to complex fault propagation mechanisms in combination with diverse operating modes. This paper presents a new data-...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014