EE7700 ML for CPS

Blog Post 07 – Paper: Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS.

Instructor: Dr. Xugui Zhou

Presentation by Group 7: Paul Yeon, Faiza Dad

Summarized by Group 8: Duc Long Vu, Abdulla Asad

Summary: This paper proposed a systematic view about achieving the resilient CPS system by applying ML algorithms. They also discuss the interaction between the ML and CPS. Also point out that ML also faces vulnerability itself. Many aspects of achieving resilient CPS by using ML and resilient ML model are discussed along with promising future research directions.

Slide by Slide Description:

Slide 1-6: Provide overview of the paper/ overview machine learning and also the ML in CPS, adversarial ML.

A white screen with text

AI-generated content may be incorrect.

A white rectangular object with black text

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A white rectangular object with black text

AI-generated content may be incorrect.

Slide 7: Provide some related work, recent works on ML security and CPS resilience

A screenshot of a computer

AI-generated content may be incorrect.

Slide 8: Provide the motivation and purpose of the paper, this paper focusing on providing knowledge and close gap between ML and CPS as well as raise the concern that even the ML help CPS but ML itself also vulnerabilities.

A screenshot of a computer

AI-generated content may be incorrect.

Slide 9: Give structure about the ML overview, apply ML in CPS, ML to improve the resilience of CPS, adversarial ML and CPS, secure ML.

A diagram of a machine learning

AI-generated content may be incorrect.

Slide 10-11: Explain the categories of ML algorithms: 3 types of ML: unsupervised, supervised, RL.

A white rectangular object with black text

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

Slide 12-13: Supervised learning algorithm explanation and main task of SL are classification and regression

A screenshot of a computer

AI-generated content may be incorrect.

Slide 13: Application of SL in CPS system with ANN for classification and regression, SVM for outlier detection and classification and KNN for data mining, intrusion detection.

A screenshot of a computer program

AI-generated content may be incorrect.

Slide 14: Explanation about the concept unsupervised learning and its common task like dimension reduction, density estimation, visualization,etc

A close-up of a paper

AI-generated content may be incorrect.

Slide 15: Explain KNN and PCA algorithm and their application of unsupervised learning in CPS system with clustering with Kmeans and PCA for dimension reduction

A white paper with black text

AI-generated content may be incorrect.

Slide 16-17: Giving overview about Reinforcement Learning, key elements include agents, policy, reward signal, value functions, etc

A diagram of a diagram

AI-generated content may be incorrect.

Slide 17: Some common RL algorithms such as Q-learning and DQN, with their mechanism and also application in autonomous vehicles

Slide 18-19: Giving overview about Deep Learning and its application in CPS such as the Autonomous vehicles, analyzing the sensor data in industrial or medical with RNN, Autoencoder

A close-up of a computer screen

AI-generated content may be incorrect.

A screenshot of a computer program

AI-generated content may be incorrect.

Section III: ML application in CPS

Slide 20 - 21 - 22: Explain why CPS is important and how  ML can help CPS system in some task such as detection malware, resource allocation, etc, ….

A white card with black text

AI-generated content may be incorrect.

A diagram of a smart city

AI-generated content may be incorrect.

A screenshot of a computer program

AI-generated content may be incorrect.

Slide 23-24: Giving some application examples of CPS in vehicular CPS such as vehicular ad-hoc network, advanced driver assistance system, Vanet Communication with explanation like V2V or V2I communication. Also some defense approaches such as blockchain, ML and DL for anomaly detection, etc

A black and white text on a white background

AI-generated content may be incorrect.

A diagram of a road with cars and text

AI-generated content may be incorrect.

Slide 25-26-27: CPS used in industrial with security applications, medical CPS systems, some case study.

A screenshot of a computer error

AI-generated content may be incorrect.

A white background with black text

AI-generated content may be incorrect.

A diagram of a person's body

AI-generated content may be incorrect.

Slide 28-29: Application of ML in Smart Grid and also some security challenges in smart grid. Some common attacks such as DoS and FDI

A black and white text on a white background

AI-generated content may be incorrect.

A white box with black text

AI-generated content may be incorrect.

Slide 30: Reinforcement learning application in CPS by quality assurance and power systems by using Rol as falsification tools, or using Deep RL to optimize the energy costs, using Q learning for modeling adversarial activities to predict and defense against attacks

A black and white text on a white background

AI-generated content may be incorrect.

ML application for resilient CPS

A white rectangular object with black text

AI-generated content may be incorrect.

Slide 32: About the Attack detection in CPS. The attack detection in CPS is different from IT systems since it is involving the physical parts. With some examples using statistical and physical domain knowledge, DL and analysis between time series data to detect attack

A close-up of a document

AI-generated content may be incorrect.

Slide 33-34: Giving some reference about the ML application for attack detection in CPS and apply for resilient CPS system

A close-up of a document

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect. 

Slide 35: CPS requires confidentiality, integrity and availability and reliability. Especially in the dynamic conditions

A close-up of a diagram

AI-generated content may be incorrect.

Slide 36-37-38-39: Generative adversarial network in CPS not only use for attack but also defense method by generating malicious sample, and the role of GAN in defense by detecting adversarial through the addition of fake samples, etc. And provide some others useful uses for GAN.

A close-up of a computer screen

AI-generated content may be incorrect.

A diagram of a network

AI-generated content may be incorrect.

A white card with black text

AI-generated content may be incorrect.

A close up of a document

AI-generated content may be incorrect.

V - Adversarial Machine Learning and CPS

A white rectangular object with black text

AI-generated content may be incorrect.

Slide 41: Giving introduction about the AML involve compromise the ML algorithm and output consequently. Provide some background information about the exploration applying AML to CPS.

A black text on a white background

AI-generated content may be incorrect.

Slide 42: Some literature review about ML affected by adversarial input, and a shift of interest towards making better defense against attacks on CPS

A close-up of a paper

AI-generated content may be incorrect.

Slide 43: Classification of tracks on ML base on goals, attack stage, level of information obtained

A diagram of a system

AI-generated content may be incorrect.

Slide 44: Attacked based on goal of the attacker. There are three goals confidence reduction, misclassification and targeted misclassification.

A black and red text and a black and white text

AI-generated content may be incorrect.

Slide 45: Attack also based on the stage, attack the training mostly easier than the testing since modifying the training data will making affect until the end of process,

A white rectangular sign with black text

AI-generated content may be incorrect.

Slide 46: There are three types of attack white box, which structure architecture of model is known. Gray or Blackbox attack, when the information about the target limitation, no knowledge. We investigate the attack based on the input and output relationship

A close-up of a document

AI-generated content may be incorrect.

Slide 47: Provide general information about methods to craft adversarial example in DNN model, mostly adding a small noise to the sample which does not make the different can be captured by naked eyes. And gradient based method in perturbation will affect CPS like self-driving care where image based decision is crucial

A close up of a document

AI-generated content may be incorrect.

Slide 48: Introduce about the FGSM method, a simple method that using noise and the sign of gradient of model loss function wrt the input vector into sample can fool the DL model

A close up of a sign

AI-generated content may be incorrect.

 Slide 49: Giving some additional information, different types of FGSM model that can have iterative variant, FGSM is quick and cheap, easy to test adversarial training method

A white and black text on a white background

AI-generated content may be incorrect.

Slide 50: BIM method which is iterative variant of the FGSM with noise term applied many times with small magnitude, it provide better performance than base FGSM

A close-up of a document

AI-generated content may be incorrect.

Slide 51: Provide information about eh JSMA attach with iterative approach focusing targeted misclassification using derivative information of the DNN

A close-up of a sign

AI-generated content may be incorrect.

Slide 52: Provide information about C&W attack based on norm 0, 2 and infinity, making the neural network misclassify and posited as test benchmark

A white card with black text

AI-generated content may be incorrect.

Slide 53: Introduce Deep fool attack using geometry approach with L2 norm minimization to finding adversarial example

A close-up of a white card

AI-generated content may be incorrect.

Slide 54: Provide information about ATN: train a different network to attack another target network

A close-up of a message

AI-generated content may be incorrect.

Slide 55-56: Give some adversarial attacks in RL, using DNN to approximate the action value function, a policy that can make adversarial attacks

A close-up of a white and black text

AI-generated content may be incorrect.

A white card with black text

AI-generated content may be incorrect.

Slide 57-58-59-60: Secure and resilient in ML and RL. Provide some defense strategy to defense against adversarial attacks in DL: Need to scarify accuracy, but with acceptable rate

A close-up of a document

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A white and black text

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

Slide 61-62-63: Discuss some research challenges and also the future direction in ML system, some follow up work. Such as Federated Learning, and the unadaptable of the Adversarial training so need adaptive method.

A close-up of a sign

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A close-up of a computer error

AI-generated content may be incorrect.

A close-up of a sign

AI-generated content may be incorrect.

A white rectangular box with black text

AI-generated content may be incorrect.

Conclusion:

This paper provides a comprehensive review about Machine Learning and its applications in CPS system. Overall ML can help the CPS work better and provide resilience for the CPS system. However, the ML algorithm itself faces vulnerability, hence improving the resilience for the ML algorithm in CPS system also requires exploration and that could make the CPS system aid ML more efficient and robust. Some potential directions are also discussed.

Q/A: No QA since it’s out of time

Discussion:

Q1. What would consider the most important params to learn about a network if using GAN against a black box CPS net?

Q2. Any novel NN architecture would consider adding to a GAN for attack or defense as part of the base architecture?

Q3. Defense architectures of GAN and AML can stay ahead the game? Anticipate new attack architecture/methods before they are brought out and use to sabotage?