6 research outputs found

    Stochastic optimization on continuous domains with finite-time guarantees by Markov chain Monte Carlo methods

    Full text link
    We introduce bounds on the finite-time performance of Markov chain Monte Carlo algorithms in approaching the global solution of stochastic optimization problems over continuous domains. A comparison with other state-of-the-art methods having finite-time guarantees for solving stochastic programming problems is included.Comment: 29 pages, 6 figures. Revised version based on referees repor

    Π ΠΎΠ·Ρ€ΠΎΠ±ΠΊΠ° ΠΌΠΎΠ΄Π΅Π»Ρ– для навчання Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½ΠΎΡ— систСми розпізнавання ΠΊΡ–Π±Π΅Ρ€Π°Ρ‚Π°ΠΊ для Π½Π΅ΠΎΠ΄Π½ΠΎΡ€Ρ–Π΄Π½ΠΈΡ… ΠΏΠΎΡ‚ΠΎΠΊΡ–Π² Π·Π°ΠΏΠΈΡ‚Ρ–Π² Π² Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… систСмах

    Get PDF
    The study presents results aimed at further development of models for intelligent and self-educational systems of recognising abnormalities and cyberattacks in mission-critical information systems (MCIS). It has been proven that the existing systems of cyberdefence still significantly rely on using models and algorithms of recognising cyberattacks, which allow taking into account information about the structure of incoming streams or the attackers’ change of the intensity of queries, the speed of the attack, and the duration of the impulse.A mathematical model has been suggested for the system module of intelligent identification of cyberattacks in heterogeneous flows of queries and network forms of cyberattacks. The model recognises heterogeneous incoming flows of queries and any possible change in the query intensity and other parameters of a targeted cyberattack aimed at a MCIS.Simulation models, which had been created in MATLAB and Simulink, were used to research the dynamics of changes in the states of the subsystem of blocking queries in the process of detecting cyberattacks in a MCIS. The probability of solving the problem of recognising cyberattacks in heterogeneous flows of queries and network forms of cyberattacks is 85–98 %, depending on the type of the cyberattack. The results of the modelling allow selection of ways to counter and neutralize the effects of the impact of such targeted attacks and help analyse more sophisticated cyberattacks.The suggested model of recognising complex cyberattacks if attackers use non-uniform flows of queries is more accurate, by 5–7 %, than the other existing models.The developed simulation models enable a 25–30 % decrease in the setup time for projects of cyberdefence systems, including SIRCA for CIS or MCIS.ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π° матСматичСская модСль для модуля систСмы ΠΈΠ½Ρ‚Π΅Π»Π»Π΅ΠΊΡ‚ΡƒΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ распознавания ΠΊΠΈΠ±Π΅Ρ€Π°Ρ‚Π°ΠΊ для Π½Π΅ΠΎΠ΄Π½ΠΎΡ€ΠΎΠ΄Π½Ρ‹Ρ… ΠΏΠΎΡ‚ΠΎΠΊΠΎΠ² запросов ΠΈ сСтСвых классов ΠΊΠΈΠ±Π΅Ρ€Π°Ρ‚Π°ΠΊ. МодСль ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Π΅Ρ‚ Π½Π΅ΠΎΠ΄Π½ΠΎΡ€ΠΎΠ΄Π½Ρ‹Π΅ Π²Ρ…ΠΎΠ΄Π½Ρ‹Π΅ ΠΏΠΎΡ‚ΠΎΠΊΠΈ запросов ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ измСнСния Π½Π°ΠΏΠ°Π΄Π°ΡŽΡ‰ΠΈΠΌΠΈ интСнсивности запросов Π² ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСмах, позволяСт ΠΎΡΡƒΡ‰Π΅ΡΡ‚Π²Π»ΡΡ‚ΡŒ Π²Ρ‹Π±ΠΎΡ€ способов противодСйствия ΠΈ Π½Π΅ΠΉΡ‚Ρ€Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ послСдствий ΠΈΡ… Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ, Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π±ΠΎΠ»Π΅Π΅ слоТныС Π²ΠΈΠ΄Ρ‹ ΠΊΠΈΠ±Π΅Ρ€Π°Ρ‚Π°ΠΊ. Π‘ ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΠΈΠΌΠΈΡ‚Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ, созданных Π² MatLAB ΠΈ Simulink, исслСдована Π΄ΠΈΠ½Π°ΠΌΠΈΠΊΠ° измСнСния состояний подсистСмы Π±Π»ΠΎΠΊΠΈΡ€ΠΎΠ²ΠΊΠΈ запросов Π² процСссС распознавания ΠΊΠΈΠ±Π΅Ρ€Π°Ρ‚Π°ΠΊ Π² критичСски Π²Π°ΠΆΠ½Ρ‹Ρ… ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Ρ‹Ρ… систСмах.Π—Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΌΠ°Ρ‚Π΅ΠΌΠ°Ρ‚ΠΈΡ‡Π½Ρƒ модСль для модуля систСми Ρ–Π½Ρ‚Π΅Π»Π΅ΠΊΡ‚ΡƒΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ розпізнавання ΠΊΡ–Π±Π΅Ρ€Π°Ρ‚Π°ΠΊ для Π½Π΅ΠΎΠ΄Π½ΠΎΡ€Ρ–Π΄Π½ΠΈΡ… ΠΏΠΎΡ‚ΠΎΠΊΡ–Π² Π·Π°ΠΏΠΈΡ‚Ρ–Π² Ρ‚Π° ΠΌΠ΅Ρ€Π΅ΠΆΠ½ΠΈΡ… класах ΠΊΡ–Π±Π΅Ρ€Π°Ρ‚Π°ΠΊ. МодСль Π²Ρ€Π°Ρ…ΠΎΠ²ΡƒΡ” Π½Π΅ΠΎΠ΄Π½ΠΎΡ€Ρ–Π΄Π½Ρ– Π²Ρ…Ρ–Π΄Π½Ρ– ΠΏΠΎΡ‚ΠΎΠΊΠΈ Π·Π°ΠΏΠΈΡ‚Ρ–Π² Ρ‚Π° ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ Π·ΠΌΡ–Π½ΠΈ Π½Π°ΠΏΠ°Π΄Π½ΠΈΠΊΠ°ΠΌΠΈ інтСнсивності Π·Π°ΠΏΠΈΡ‚Ρ–Π² Ρƒ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… систСмах, Ρ‰ΠΎ дозволяє Π·Π΄Ρ–ΠΉΡΠ½ΡŽΠ²Π°Ρ‚ΠΈ Π²ΠΈΠ±Ρ–Ρ€ способів ΠΏΡ€ΠΎΡ‚ΠΈΠ΄Ρ–Ρ— Ρ‚Π° Π½Π΅ΠΉΡ‚Ρ€Π°Π»Ρ–Π·Π°Ρ†Ρ–Ρ— наслідків Π²Ρ–Π΄ Ρ—Ρ… Π²ΠΏΠ»ΠΈΠ²Ρƒ, Π°Π½Π°Π»Ρ–Π·ΡƒΠ²Π°Ρ‚ΠΈ Π±Ρ–Π»ΡŒΡˆ складні Π²ΠΈΠ΄ΠΈ ΠΊΡ–Π±Π΅Ρ€Π°Ρ‚Π°ΠΊ. Π—Π° допомогою Ρ–ΠΌΡ–Ρ‚Π°Ρ†Ρ–ΠΉΠ½ΠΈΡ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ, створСних Ρƒ MatLAB Ρ‚Π° Simulink, дослідТСно Π΄ΠΈΠ½Π°ΠΌΡ–ΠΊΡƒ Π·ΠΌΡ–Π½ΠΈ станів підсистСми блокування Π·Π°ΠΏΠΈΡ‚Ρ–Π² Π² процСсі розпізнавання ΠΊΡ–Π±Π΅Ρ€Π°Ρ‚Π°ΠΊ Ρƒ ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΎ Π²Π°ΠΆΠ»ΠΈΠ²ΠΈΡ… ΠΊΠΎΠΌΠΏβ€™ΡŽΡ‚Π΅Ρ€Π½ΠΈΡ… систСмах

    Conformance Testing as Falsification for Cyber-Physical Systems

    Full text link
    In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidelity levels can enable mathematical analysis of the model, control synthesis, faster simulation etc. Furthermore, when (automatically or manually) transitioning from a model to its implementation on an actual computational platform, then again two different versions of the same system are being developed. In all previous cases, it is necessary to define a rigorous notion of conformance between different models and between models and their implementations. This paper argues that conformance should be a measure of distance between systems. Albeit a range of theoretical distance notions exists, a way to compute such distances for industrial size systems and models has not been proposed yet. This paper addresses exactly this problem. A universal notion of conformance as closeness between systems is rigorously defined, and evidence is presented that this implies a number of other application-dependent conformance notions. An algorithm for detecting that two systems are not conformant is then proposed, which uses existing proven tools. A method is also proposed to measure the degree of conformance between two systems. The results are demonstrated on a range of models
    corecore