520 research outputs found

    Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system

    Get PDF
    Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however, is extremely difficult. In this paper, we propose a novel approach for constructing models of CPS automatically, by applying supervised machine learning to data traces obtained after systematically seeding their software components with faults ("mutants"). We demonstrate the efficacy of this approach on the simulator of a real-world water purification plant, presenting a framework that automatically generates mutants, collects data traces, and learns an SVM-based model. Using cross-validation and statistical model checking, we show that the learnt model characterises an invariant physical property of the system. Furthermore, we demonstrate the usefulness of the invariant by subjecting the system to 55 network and code-modification attacks, and showing that it can detect 85% of them from the data logs generated at runtime.Comment: Accepted by IEEE S&P 201

    AI Solutions for MDS: Artificial Intelligence Techniques for Misuse Detection and Localisation in Telecommunication Environments

    Get PDF
    This report considers the application of Articial Intelligence (AI) techniques to the problem of misuse detection and misuse localisation within telecommunications environments. A broad survey of techniques is provided, that covers inter alia rule based systems, model-based systems, case based reasoning, pattern matching, clustering and feature extraction, articial neural networks, genetic algorithms, arti cial immune systems, agent based systems, data mining and a variety of hybrid approaches. The report then considers the central issue of event correlation, that is at the heart of many misuse detection and localisation systems. The notion of being able to infer misuse by the correlation of individual temporally distributed events within a multiple data stream environment is explored, and a range of techniques, covering model based approaches, `programmed' AI and machine learning paradigms. It is found that, in general, correlation is best achieved via rule based approaches, but that these suffer from a number of drawbacks, such as the difculty of developing and maintaining an appropriate knowledge base, and the lack of ability to generalise from known misuses to new unseen misuses. Two distinct approaches are evident. One attempts to encode knowledge of known misuses, typically within rules, and use this to screen events. This approach cannot generally detect misuses for which it has not been programmed, i.e. it is prone to issuing false negatives. The other attempts to `learn' the features of event patterns that constitute normal behaviour, and, by observing patterns that do not match expected behaviour, detect when a misuse has occurred. This approach is prone to issuing false positives, i.e. inferring misuse from innocent patterns of behaviour that the system was not trained to recognise. Contemporary approaches are seen to favour hybridisation, often combining detection or localisation mechanisms for both abnormal and normal behaviour, the former to capture known cases of misuse, the latter to capture unknown cases. In some systems, these mechanisms even work together to update each other to increase detection rates and lower false positive rates. It is concluded that hybridisation offers the most promising future direction, but that a rule or state based component is likely to remain, being the most natural approach to the correlation of complex events. The challenge, then, is to mitigate the weaknesses of canonical programmed systems such that learning, generalisation and adaptation are more readily facilitated

    Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Network co-regulated modules are believed to have the functionality of packaging multiple biological entities, and can thus be assumed to coordinate many biological functions in their network neighbouring regions.</p> <p>Results</p> <p>Here, we weighted edges of a human protein interaction network and a transcriptional regulatory network to construct an integrated network, and introduce a probabilistic model and a bipartite graph framework to exploit human co-regulated modules and uncover their specific features in packaging different biological entities (genes, protein complexes or metabolic pathways). Finally, we identified 96 human co-regulated modules based on this method, and evaluate its effectiveness by comparing it with four other methods.</p> <p>Conclusions</p> <p>Dysfunctions in co-regulated interactions often occur in the development of cancer. Therefore, we focussed on an example co-regulated module and found that it could integrate a number of cancer-related genes. This was extended to causal dysfunctions of some complexes maintained by several physically interacting proteins, thus coordinating several metabolic pathways that directly underlie cancer.</p

    Intelligent network intrusion detection using an evolutionary computation approach

    Get PDF
    With the enormous growth of users\u27 reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems. Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never completely remove the threat of network attacks. A good security mechanism requires an Intrusion Detection System (IDS) in order to monitor security breaches when the prevention schemes in the preparation phase are bypassed. To be able to react to network attacks as fast as possible, an automatic detection system is of paramount importance. The later an attack is detected, the less time network administrators have to update their signatures and reconfigure their detection and remediation systems. An IDS is a tool for monitoring the system with the aim of detecting and alerting intrusive activities in networks. These tools are classified into two major categories of signature-based and anomaly-based. A signature-based IDS stores the signature of known attacks in a database and discovers occurrences of attacks by monitoring and comparing each communication in the network against the database of signatures. On the other hand, mechanisms that deploy anomaly detection have a model of normal behaviour of system and any significant deviation from this model is reported as anomaly. This thesis aims at addressing the major issues in the process of developing signature based IDSs. These are: i) their dependency on experts to create signatures, ii) the complexity of their models, iii) the inflexibility of their models, and iv) their inability to adapt to the changes in the real environment and detect new attacks. To meet the requirements of a good IDS, computational intelligence methods have attracted considerable interest from the research community. This thesis explores a solution to automatically generate compact rulesets for network intrusion detection utilising evolutionary computation techniques. The proposed framework is called ESR-NID (Evolving Statistical Rulesets for Network Intrusion Detection). Using an interval-based structure, this method can be deployed for any continuous-valued input data. Therefore, by choosing appropriate statistical measures (i.e. continuous-valued features) of network trafc as the input to ESRNID, it can effectively detect varied types of attacks since it is not dependent on the signatures of network packets. In ESR-NID, several innovations in the genetic algorithm were developed to keep the ruleset small. A two-stage evaluation component in the evolutionary process takes the cooperation of rules into consideration and results into very compact, easily understood rulesets. The effectiveness of this approach is evaluated against several sources of data for both detection of normal and abnormal behaviour. The results are found to be comparable to those achieved using other machine learning methods from both categories of GA-based and non-GA-based methods. One of the significant advantages of ESR-NIS is that it can be tailored to specific problem domains and the characteristics of the dataset by the use of different fitness and performance functions. This makes the system a more flexible model compared to other learning techniques. Additionally, an IDS must adapt itself to the changing environment with the least amount of configurations. ESR-NID uses an incremental learning approach as new flow of traffic become available. The incremental learning approach benefits from less required storage because it only keeps the generated rules in its database. This is in contrast to the infinitely growing size of repository of raw training data required for traditional learning

    AFRANCI : multi-layer architecture for cognitive agents

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 201

    Genetic approaches to understanding pain mechanisms: Zfhx2 and peripheral sensory neuron ablation mouse transgenic models

    Get PDF
    Latest cutting-edge sequencing has allowed researchers to obtain a full array of differentially expressed neuronal genes within the peripheral nervous system. Understanding this heterogeneity and functional implication could unveil new therapeutic targets towards a more precise medicine. Combining a novel reporter mouse with Cre recombinase strategies, I examined the spatial and functional organization of transcriptomically different subpopulations of neurons in the mouse DRG in pathological and nonpathological states. Results herein include: confirmation of Cre activity and specificity in all lines studied by RNA scope when compared to previous reports and transcriptomic analysis; significant upregulation of DRG gal expression after Complete Freund's Adjuvant (CFA) induced inflamation; normal weight and exploratory behaviour for all lines tested; motor activity assessed by Rotarod not significant, but further motor coordination tests on animals missing Th DRG neurons showed significant impairment; noxious mechanosensation reduced in animals lacking SCN10aCre and Tmem45b DRG; confirmation of CGRP-positive neurons role in heat and cold perception as well as in the formalin inflammatory model; Von Frey hypersensitivity on animals lacking CGRP; and lastly TrkBpositive neurons responsible for significant deficits in mechanical hypersensitivity in the partial sciatic nerve ligation neuropathic pain model whilst no effect in cancer induced bone pain model. Parallelly, by reverse genetics approach, I explore the contribution of the Zfhx2 gene, whose mutation has been identified as responsible for the Marsili pain insensitivity syndrome, in two different animal models of nociception. Behavioural characterisation of bacterial artificial chromosome (BAC) transgenic mice bearing the orthologous murine mutation, as well as Zfhx2 null mutant mice, shows significant deficits in pain sensitivity in thermal and mechanical tests respectively. In summary, as well as validating several new useful transgenic mouse lines, this thesis provides insights into genes and neuronal subpopulations important in pain pathways and provides potential platforms for translational studies of pain syndromes

    DEVELOPMENT OF SPACE-INVARIANT SIGNATURE ALGORITHM (SISA) - AN INNOVATIVE APPROACH FOR PROCESSING THE MEDICAL IMAGES FOR THE DETECTION AND LOCALIZATION OF EARLY ABNORMALITIES IN BIOLOGICAL TISSUES

    Get PDF
    Early detection, diagnosis and localization are some of the important issues facing the medical profession for diseases such as cancer and cardiac disorders. Therefore, it is vital that a reliable approach, which is economic, safer and less time consuming be developed for the detection and diagnosis of such disorders. In this thesis an innovative approach, Space-Invariant Signature Algorithm (SISA) is proposed and developed to process the medical images for the detection and localization of abnormalities at an early stage in active biological tissues such as cancer, potential tumor growth and damaged tissues. In this proposed SISA approach, if the SISA signature pattern is space-invariant it suggests the absence of any abnormality. A space-variant SISA signature pattern is an indication of the presence of the abnormality. The abnormality in an active system can be defined as the obstacle, which impedes the smooth flow of activities such as blood or electrical signals. In any active system under excitation, abnormalities create extra perturbations, depending on the stage of progression of the abnormality. An abnormality in the final stage or critical stage will create very high perturbations that would largely impede the smooth flow of the excitation, whereas, in early stages, the abnormality will create low perturbations and would slightly impede the smooth flow of the excitation provided to the active system. Using the SISA approach, in the absence of any abnormalities, the signature pattern should have a uniform signature pattern, whereas, in the presences of abnormalities, the SISA signature pattern will be space-variant. The degree and position of the variance in space helps in the detection and localization of the abnormality. The SISA approach was first tested on a liquid vibrating system with various types of obstacles. These abnormalities created perturbations in the system parameters that induced the vibration patterns. Furthermore, the experimental results using the SISA approach were also obtained on ultrasound images to find abnormalities in animal tissues. In each of these cases of ultrasound imaging, the SISA signature patterns were able to localize and detect the tissue abnormality. The experimental results obtained with various types of small and large impedances (obstacles), which represent respectively the early and critical stages of abnormalities in the vibrating liquid system, were very encouraging. This basic SISA study on the liquid vibrating system was extended for processing ultrasound images for the detection and localization of damaged biological tissues. These initial experiments on animal tissues using ultrasound images along with SISA processing indicate that this innovative SISA approach has a great potential for processing other types of medical images such as ultrasound, Magnetic Resonance Elastography (MRE) and Computed Tomography (CT scan) for the detection and localization of abnormalities at an incipient stage

    Perspectives and Experiences of Individuals Undergoing Predictive Testing for Hereditary Breast and Ovarian Cancer (HBOC) Syndrome in the Western Cape, South Africa.

    Get PDF
    Breast cancer is the most common malignancy affecting females globally. Hereditary breast and ovarian cancer (HBOC) syndrome is caused by pathogenic variants in BRCA1 and BRCA2 and is seen in approximately 50% of families with a strong history of breast and ovarian cancers. Predictive testing (PT) is offered to unaffected individuals with a positive family history of HBOC, with an already identified BRCA1 or BRCA2 mutation in an affected family member. There is an overwhelming amount of research that has focused on the after-effects of diagnostic genetic testing for HBOC but there has been little investigation into how individuals experience the actual PT process. The present study therefore aimed to investigate individuals’ decisions for undergoing and their experiences of PT for HBOC in a local context, by focusing on at-risk South African individuals residing in the Western Cape Province. Sixteen participants were recruited retrospectively from the breast cancer and/or clinical genetics clinics at Groote Schuur Hospital, Tygerberg Hospital and private genetic counselling practices in Cape Town. Semi structured interviews were conducted, and the interview transcripts were analysed using the framework approach for qualitative data analysis. Using this approach, five themes were identified relating to the perspectives and experiences of individuals undergoing PT for HBOC, in selected settings in the Western Cape. While some participants felt that their decision to pursue PT was influenced by their family history of cancer and the associated cancer-related distress, others felt that their decision was made out of a sense of duty to their families or in solidarity with those that were affected or received a positive test result. Overall, the participants felt that the pre-test counselling was beneficial in allowing for an improved understanding of HBOC, however not all participants felt that the pre-test counselling prepared them for receiving their results. Receiving a negative test result was often accompanied by feelings of guilt and did not exempt participants from the fear of developing cancer. Some of the concerns raised by participants that received a positive test result were centred around prophylactic intervention and its effect on body image. Overall, participants felt empowered by their mutation status and felt that they were better able to manage their risk. The need for additional support, both practical and emotional support, was particularly evident amongst mutation-carriers. The findings of this study provide valuable insight into the perspectives and experiences of this population, which could potentially impact the services that are provided to individuals undergoing PT for HBOC in similar settings

    Positron emission tomography imaging biomarkers of frontotemporal dementia

    Get PDF
    There are currently no disease modifying treatments available for frontotemporal dementia (FTD). Pathological heterogeneity within and between FTD phenotypes and genotypes makes accurate diagnosis challenging. Biomarkers that can aid diagnosis and monitor disease progression will be critical for clinical trials of potential treatments. Positron emission tomography (PET) imaging provides insights into molecular changes in the brain during life that are otherwise only directly quantifiable at postmortem. In this thesis I aimed to identify potential biomarkers of FTD using PET imaging. In Chapter 3 I use PET imaging of glucose metabolism to identify early neuronal dysfunction in presymptomatic genetic FTD, revealing specific involvement of the anterior cingulate in a subgroup of mutation carriers. In Chapter 4 I evaluate the utility of a PET tracer of tau protein deposition in genetic FTD against volumetric imaging, which appears to provide a more sensitive biomarker of disease than this tau PET tracer in FTD. In Chapter 5 I investigate neuroinflammation via PET imaging and identify different areas of neuroinflammation in different FTD genotypes, suggesting an association between neuroinflammation and protein deposition and that PET imaging of neuroinflammation might provide a sensitive biomarker in MAPT-related FTD. In Chapter 6 I investigate synaptic and mitochondrial dysfunction via PET imaging in FTD, the latter of which has been previously unexplored. I reveal marked differences in both markers in FTD versus controls which suggests both might provide sensitive biomarkers of disease. Furthermore, in Chapter 7 I evaluate the same biomarkers at longitudinal follow up where I find continued reductions in mitochondrial function over time suggesting mitochondrial PET imaging may provide a biomarker of disease progression in FTD. Future replication of the findings in this thesis in larger cohorts might facilitate the advancement of clinical trials in FTD
    corecore