-
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Authors:
Vitaliy Pozdnyakov,
Aleksandr Kovalenko,
Ilya Makarov,
Mikhail Drobyshevskiy,
Kirill Lukyanov
Abstract:
Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for fault diagnosis in ACS using the Tennessee Eastman Proces…
▽ More
Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for fault diagnosis in ACS using the Tennessee Eastman Process dataset. By evaluating three neural networks with different architectures, we subject them to six types of adversarial attacks and explore five different defense methods. Our results highlight the strong vulnerability of models to adversarial samples and the varying effectiveness of defense strategies. We also propose a novel protection approach by combining multiple defense methods and demonstrate it's efficacy. This research contributes several insights into securing machine learning within ACS, ensuring robust fault diagnosis in industrial processes.
△ Less
Submitted 7 June, 2024; v1 submitted 20 March, 2024;
originally announced March 2024.
-
Creating a vulnerable node based on the vulnerability MS17-010
Authors:
Aleksey Novokhrestov,
Anton Kalyakin,
Aleksandr Kovalenko,
Vladimir Repkin
Abstract:
The creation of a vulnerable node has been demonstrated through the analysis and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the SMBv1 protocol on various Windows operating systems. The principle and methodology of exploiting the vulnerability are described, with a formalized representation of the exploitation in the form of a Meta Attack Language (MAL) graph. Additiona…
▽ More
The creation of a vulnerable node has been demonstrated through the analysis and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the SMBv1 protocol on various Windows operating systems. The principle and methodology of exploiting the vulnerability are described, with a formalized representation of the exploitation in the form of a Meta Attack Language (MAL) graph. Additionally, the attacker's implementation is outlined as the execution of an automated script in Python using the Metasploit Framework. Basic security measures for systems utilizing the SMBv1 protocol are provided.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Linear Self-Attention Approximation via Trainable Feedforward Kernel
Authors:
Uladzislau Yorsh,
Alexander Kovalenko
Abstract:
In pursuit of faster computation, Efficient Transformers demonstrate an impressive variety of approaches -- models attaining sub-quadratic attention complexity can utilize a notion of sparsity or a low-rank approximation of inputs to reduce the number of attended keys; other ways to reduce complexity include locality-sensitive hashing, key pooling, additional memory to store information in compact…
▽ More
In pursuit of faster computation, Efficient Transformers demonstrate an impressive variety of approaches -- models attaining sub-quadratic attention complexity can utilize a notion of sparsity or a low-rank approximation of inputs to reduce the number of attended keys; other ways to reduce complexity include locality-sensitive hashing, key pooling, additional memory to store information in compacted or hybridization with other architectures, such as CNN. Often based on a strong mathematical basis, kernelized approaches allow for the approximation of attention with linear complexity while retaining high accuracy. Therefore, in the present paper, we aim to expand the idea of trainable kernel methods to approximate the self-attention mechanism of the Transformer architecture.
△ Less
Submitted 8 November, 2022;
originally announced November 2022.
-
Graph Neural Networks with Trainable Adjacency Matrices for Fault Diagnosis on Multivariate Sensor Data
Authors:
Alexander Kovalenko,
Vitaliy Pozdnyakov,
Ilya Makarov
Abstract:
Timely detected anomalies in the chemical technological processes, as well as the earliest detection of the cause of the fault, significantly reduce the production cost in the industrial factories. Data on the state of the technological process and the operation of production equipment are received by a large number of different sensors. To better predict the behavior of the process and equipment,…
▽ More
Timely detected anomalies in the chemical technological processes, as well as the earliest detection of the cause of the fault, significantly reduce the production cost in the industrial factories. Data on the state of the technological process and the operation of production equipment are received by a large number of different sensors. To better predict the behavior of the process and equipment, it is necessary not only to consider the behavior of the signals in each sensor separately, but also to take into account their correlation and hidden relationships with each other. Graph-based data representation helps with this. The graph nodes can be represented as data from the different sensors, and the edges can display the influence of these data on each other. In this work, the possibility of applying graph neural networks to the problem of fault diagnosis in a chemical process is studied. It was proposed to construct a graph during the training of graph neural network. This allows to train models on data where the dependencies between the sensors are not known in advance. In this work, several methods for obtaining adjacency matrices were considered, as well as their quality was studied. It has also been proposed to use multiple adjacency matrices in one model. We showed state-of-the-art performance on the fault diagnosis task with the Tennessee Eastman Process dataset. The proposed graph neural networks outperformed the results of recurrent neural networks.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
System Attack Modeling Techniques Critical Information Infrastructure
Authors:
A. K. Novokhrestov,
A. A. Konev,
A. S. Kovalenko,
N. I. Sermavkin
Abstract:
Every day around the world, various organizations are exposed to more than a hundred attacks, most of which are success-fully repelled by information security specialists. However, attacks are also carried out that some information systems or specialists are unable to repel, which is why a large number of enterprises, as well as individuals, suffer huge monetary and reputational losses. The aim of…
▽ More
Every day around the world, various organizations are exposed to more than a hundred attacks, most of which are success-fully repelled by information security specialists. However, attacks are also carried out that some information systems or specialists are unable to repel, which is why a large number of enterprises, as well as individuals, suffer huge monetary and reputational losses. The aim of the work is to train specialists through cyber polygons and interactive games to a high level of knowledge and skills in the field of information security
△ Less
Submitted 18 December, 2021;
originally announced December 2021.
-
SimpleTRON: Simple Transformer with O(N) Complexity
Authors:
Uladzislau Yorsh,
Alexander Kovalenko,
Vojtěch Vančura,
Daniel Vašata,
Pavel Kordík,
Tomáš Mikolov
Abstract:
In this paper, we propose that the dot product pairwise matching attention layer, which is widely used in Transformer-based models, is redundant for the model performance. Attention, in its original formulation, has to be seen rather as a human-level tool to explore and/or visualize relevancy scores in sequential data. However, the way how it is constructed leads to significant computational compl…
▽ More
In this paper, we propose that the dot product pairwise matching attention layer, which is widely used in Transformer-based models, is redundant for the model performance. Attention, in its original formulation, has to be seen rather as a human-level tool to explore and/or visualize relevancy scores in sequential data. However, the way how it is constructed leads to significant computational complexity. Instead, we present SimpleTRON: Simple Transformer with O(N) Complexity, a simple and fast alternative without any approximation that, unlike other approximation models, does not have any architecture-related overhead and therefore can be seen as a purely linear Transformer-like model. This architecture, to the best of our knowledge, outperforms existing sub-quadratic attention approximation models on several tasks from the Long-Range Arena benchmark. Moreover, we show, that SimpleTRON can benefit from weight transfer from pretrained large language models, as its parameters can be fully transferable.
△ Less
Submitted 28 June, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Dynamic Neural Diversification: Path to Computationally Sustainable Neural Networks
Authors:
Alexander Kovalenko,
Pavel Kordík,
Magda Friedjungová
Abstract:
Small neural networks with a constrained number of trainable parameters, can be suitable resource-efficient candidates for many simple tasks, where now excessively large models are used. However, such models face several problems during the learning process, mainly due to the redundancy of the individual neurons, which results in sub-optimal accuracy or the need for additional training steps. Here…
▽ More
Small neural networks with a constrained number of trainable parameters, can be suitable resource-efficient candidates for many simple tasks, where now excessively large models are used. However, such models face several problems during the learning process, mainly due to the redundancy of the individual neurons, which results in sub-optimal accuracy or the need for additional training steps. Here, we explore the diversity of the neurons within the hidden layer during the learning process, and analyze how the diversity of the neurons affects predictions of the model. As following, we introduce several techniques to dynamically reinforce diversity between neurons during the training. These decorrelation techniques improve learning at early stages and occasionally help to overcome local minima faster. Additionally, we describe novel weight initialization method to obtain decorrelated, yet stochastic weight initialization for a fast and efficient neural network training. Decorrelated weight initialization in our case shows about 40% relative increase in test accuracy during the first 5 epochs.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Robust Resource Allocation Using Edge Computing for Vehicle to Infrastructure (V2I) Networks
Authors:
Anna Kovalenko,
Razin Farhan Hussain,
Omid Semiari,
Mohsen Amini Salehi
Abstract:
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Netwo…
▽ More
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Networks, and particularly, Vehicle-to-Infrastructure (V2I) systems must provide a consistent real-time response to autonomous vehicles. During peak hours or disasters, when a surge of requests arrives at a Base Station, it is challenging for the V2I system to maintain its performance, which can lead to hazardous consequences. Hence, the goal of this research is to develop a V2I system that is robust against uncertain request arrivals. To achieve this goal, we propose to dynamically allocate service requests among Base Stations. We develop an uncertainty-aware resource allocation method for the federated environment that assigns arriving requests to a Base Station so that the likelihood of completing it on-time is maximized. We evaluate the system under various workload conditions and oversubscription levels. Simulation results show that edge federation can improve robustness of the V2I system by reducing the overall service miss rate by up to 45%.
△ Less
Submitted 11 May, 2019;
originally announced May 2019.
-
Steps in creation of educational and research web-portal of nuclear knowledge BelNET
Authors:
S. Charapitsa,
I. Dubovskaya,
I. Kimlenko,
A. Kovalenko,
A. Lobko,
A. Mazanik,
N. Polyak,
T. Savitskaya,
S. Sytova,
A. Timoschenko
Abstract:
Belarusian State University is currently developing the educational and research web portal of nuclear knowledge BelNET (Belarusian Nuclear Education and Training Portal). In the future, this specialized electronic portal could grow into a national portal of nuclear knowledge. The concept, structure and taxonomy of BelNET portal are developed. The requirements and conditions for its functioning ar…
▽ More
Belarusian State University is currently developing the educational and research web portal of nuclear knowledge BelNET (Belarusian Nuclear Education and Training Portal). In the future, this specialized electronic portal could grow into a national portal of nuclear knowledge. The concept, structure and taxonomy of BelNET portal are developed. The requirements and conditions for its functioning are analyzed. The information model and architecture of the portal, as well as algorithms and methods of software are realized. At present, BelNET software implemented all the basic functions of this portal, including the ability to remotely (via the Internet) open content editing, sorting, filtering, etc. Filling the BelNET by knowledge is at the beginning.
△ Less
Submitted 14 December, 2015;
originally announced December 2015.