6 research outputs found
Stochastic optimization on continuous domains with finite-time guarantees by Markov chain Monte Carlo methods
We introduce bounds on the finite-time performance of Markov chain Monte
Carlo algorithms in approaching the global solution of stochastic optimization
problems over continuous domains. A comparison with other state-of-the-art
methods having finite-time guarantees for solving stochastic programming
problems is included.Comment: 29 pages, 6 figures. Revised version based on referees repor
Π ΠΎΠ·ΡΠΎΠ±ΠΊΠ° ΠΌΠΎΠ΄Π΅Π»Ρ Π΄Π»Ρ Π½Π°Π²ΡΠ°Π½Π½Ρ Π°Π΄Π°ΠΏΡΠΈΠ²Π½ΠΎΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΡΠΎΠ·ΠΏΡΠ·Π½Π°Π²Π°Π½Π½Ρ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π΄Π»Ρ Π½Π΅ΠΎΠ΄Π½ΠΎΡΡΠ΄Π½ΠΈΡ ΠΏΠΎΡΠΎΠΊΡΠ² Π·Π°ΠΏΠΈΡΡΠ² Π² ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
The study presents results aimed at further development of models for intelligent and self-educational systems of recognising abnormalities and cyberattacks in mission-critical information systems (MCIS). It has been proven that the existing systems of cyberdefence still significantly rely on using models and algorithms of recognising cyberattacks, which allow taking into account information about the structure of incoming streams or the attackersβ change of the intensity of queries, the speed of the attack, and the duration of the impulse.A mathematical model has been suggested for the system module of intelligent identification of cyberattacks in heterogeneous flows of queries and network forms of cyberattacks. The model recognises heterogeneous incoming flows of queries and any possible change in the query intensity and other parameters of a targeted cyberattack aimed at a MCIS.Simulation models, which had been created in MATLAB and Simulink, were used to research the dynamics of changes in the states of the subsystem of blocking queries in the process of detecting cyberattacks in a MCIS. The probability of solving the problem of recognising cyberattacks in heterogeneous flows of queries and network forms of cyberattacks is 85β98 %, depending on the type of the cyberattack. The results of the modelling allow selection of ways to counter and neutralize the effects of the impact of such targeted attacks and help analyse more sophisticated cyberattacks.The suggested model of recognising complex cyberattacks if attackers use non-uniform flows of queries is more accurate, by 5β7 %, than the other existing models.The developed simulation models enable a 25β30 % decrease in the setup time for projects of cyberdefence systems, including SIRCA for CIS or MCIS.ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π° ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ ΠΌΠΎΠ΄Π΅Π»Ρ Π΄Π»Ρ ΠΌΠΎΠ΄ΡΠ»Ρ ΡΠΈΡΡΠ΅ΠΌΡ ΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠ³ΠΎ ΡΠ°ΡΠΏΠΎΠ·Π½Π°Π²Π°Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π΄Π»Ρ Π½Π΅ΠΎΠ΄Π½ΠΎΡΠΎΠ΄Π½ΡΡ
ΠΏΠΎΡΠΎΠΊΠΎΠ² Π·Π°ΠΏΡΠΎΡΠΎΠ² ΠΈ ΡΠ΅ΡΠ΅Π²ΡΡ
ΠΊΠ»Π°ΡΡΠΎΠ² ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ. ΠΠΎΠ΄Π΅Π»Ρ ΡΡΠΈΡΡΠ²Π°Π΅Ρ Π½Π΅ΠΎΠ΄Π½ΠΎΡΠΎΠ΄Π½ΡΠ΅ Π²Ρ
ΠΎΠ΄Π½ΡΠ΅ ΠΏΠΎΡΠΎΠΊΠΈ Π·Π°ΠΏΡΠΎΡΠΎΠ² ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ Π½Π°ΠΏΠ°Π΄Π°ΡΡΠΈΠΌΠΈ ΠΈΠ½ΡΠ΅Π½ΡΠΈΠ²Π½ΠΎΡΡΠΈ Π·Π°ΠΏΡΠΎΡΠΎΠ² Π² ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΠΎΡΡΡΠ΅ΡΡΠ²Π»ΡΡΡ Π²ΡΠ±ΠΎΡ ΡΠΏΠΎΡΠΎΠ±ΠΎΠ² ΠΏΡΠΎΡΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡΠ²ΠΈΡ ΠΈ Π½Π΅ΠΉΡΡΠ°Π»ΠΈΠ·Π°ΡΠΈΠΈ ΠΏΠΎΡΠ»Π΅Π΄ΡΡΠ²ΠΈΠΉ ΠΈΡ
ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ, Π°Π½Π°Π»ΠΈΠ·ΠΈΡΠΎΠ²Π°ΡΡ Π±ΠΎΠ»Π΅Π΅ ΡΠ»ΠΎΠΆΠ½ΡΠ΅ Π²ΠΈΠ΄Ρ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ. Π‘ ΠΏΠΎΠΌΠΎΡΡΡ ΠΈΠΌΠΈΡΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ, ΡΠΎΠ·Π΄Π°Π½Π½ΡΡ
Π² MatLAB ΠΈ Simulink, ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½Π° Π΄ΠΈΠ½Π°ΠΌΠΈΠΊΠ° ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ ΡΠΎΡΡΠΎΡΠ½ΠΈΠΉ ΠΏΠΎΠ΄ΡΠΈΡΡΠ΅ΠΌΡ Π±Π»ΠΎΠΊΠΈΡΠΎΠ²ΠΊΠΈ Π·Π°ΠΏΡΠΎΡΠΎΠ² Π² ΠΏΡΠΎΡΠ΅ΡΡΠ΅ ΡΠ°ΡΠΏΠΎΠ·Π½Π°Π²Π°Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π² ΠΊΡΠΈΡΠΈΡΠ΅ΡΠΊΠΈ Π²Π°ΠΆΠ½ΡΡ
ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΡΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
.ΠΠ°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ½Ρ ΠΌΠΎΠ΄Π΅Π»Ρ Π΄Π»Ρ ΠΌΠΎΠ΄ΡΠ»Ρ ΡΠΈΡΡΠ΅ΠΌΠΈ ΡΠ½ΡΠ΅Π»Π΅ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·ΠΏΡΠ·Π½Π°Π²Π°Π½Π½Ρ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Π΄Π»Ρ Π½Π΅ΠΎΠ΄Π½ΠΎΡΡΠ΄Π½ΠΈΡ
ΠΏΠΎΡΠΎΠΊΡΠ² Π·Π°ΠΏΠΈΡΡΠ² ΡΠ° ΠΌΠ΅ΡΠ΅ΠΆΠ½ΠΈΡ
ΠΊΠ»Π°ΡΠ°Ρ
ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ. ΠΠΎΠ΄Π΅Π»Ρ Π²ΡΠ°Ρ
ΠΎΠ²ΡΡ Π½Π΅ΠΎΠ΄Π½ΠΎΡΡΠ΄Π½Ρ Π²Ρ
ΡΠ΄Π½Ρ ΠΏΠΎΡΠΎΠΊΠΈ Π·Π°ΠΏΠΈΡΡΠ² ΡΠ° ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ Π·ΠΌΡΠ½ΠΈ Π½Π°ΠΏΠ°Π΄Π½ΠΈΠΊΠ°ΠΌΠΈ ΡΠ½ΡΠ΅Π½ΡΠΈΠ²Π½ΠΎΡΡΡ Π·Π°ΠΏΠΈΡΡΠ² Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
, ΡΠΎ Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ Π·Π΄ΡΠΉΡΠ½ΡΠ²Π°ΡΠΈ Π²ΠΈΠ±ΡΡ ΡΠΏΠΎΡΠΎΠ±ΡΠ² ΠΏΡΠΎΡΠΈΠ΄ΡΡ ΡΠ° Π½Π΅ΠΉΡΡΠ°Π»ΡΠ·Π°ΡΡΡ Π½Π°ΡΠ»ΡΠ΄ΠΊΡΠ² Π²ΡΠ΄ ΡΡ
Π²ΠΏΠ»ΠΈΠ²Ρ, Π°Π½Π°Π»ΡΠ·ΡΠ²Π°ΡΠΈ Π±ΡΠ»ΡΡ ΡΠΊΠ»Π°Π΄Π½Ρ Π²ΠΈΠ΄ΠΈ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ. ΠΠ° Π΄ΠΎΠΏΠΎΠΌΠΎΠ³ΠΎΡ ΡΠΌΡΡΠ°ΡΡΠΉΠ½ΠΈΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ, ΡΡΠ²ΠΎΡΠ΅Π½ΠΈΡ
Ρ MatLAB ΡΠ° Simulink, Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ Π΄ΠΈΠ½Π°ΠΌΡΠΊΡ Π·ΠΌΡΠ½ΠΈ ΡΡΠ°Π½ΡΠ² ΠΏΡΠ΄ΡΠΈΡΡΠ΅ΠΌΠΈ Π±Π»ΠΎΠΊΡΠ²Π°Π½Π½Ρ Π·Π°ΠΏΠΈΡΡΠ² Π² ΠΏΡΠΎΡΠ΅ΡΡ ΡΠΎΠ·ΠΏΡΠ·Π½Π°Π²Π°Π½Π½Ρ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ Ρ ΠΊΡΠΈΡΠΈΡΠ½ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΈΡ
ΠΊΠΎΠΌΠΏβΡΡΠ΅ΡΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
Conformance Testing as Falsification for Cyber-Physical Systems
In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable
to develop several models of varying fidelity. Models of different fidelity
levels can enable mathematical analysis of the model, control synthesis, faster
simulation etc. Furthermore, when (automatically or manually) transitioning
from a model to its implementation on an actual computational platform, then
again two different versions of the same system are being developed. In all
previous cases, it is necessary to define a rigorous notion of conformance
between different models and between models and their implementations. This
paper argues that conformance should be a measure of distance between systems.
Albeit a range of theoretical distance notions exists, a way to compute such
distances for industrial size systems and models has not been proposed yet.
This paper addresses exactly this problem. A universal notion of conformance as
closeness between systems is rigorously defined, and evidence is presented that
this implies a number of other application-dependent conformance notions. An
algorithm for detecting that two systems are not conformant is then proposed,
which uses existing proven tools. A method is also proposed to measure the
degree of conformance between two systems. The results are demonstrated on a
range of models