Skip to main content
Erschienen in: Neural Computing and Applications 23/2020

24.02.2020 | S.I. : Emerging applications of Deep Learning and Spiking ANN

Critical infrastructure protection based on memory-augmented meta-learning framework

verfasst von: Xie Bing

Erschienen in: Neural Computing and Applications | Ausgabe 23/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Critical infrastructures are related to systems which are essential for sustaining the important functions of a society. Their potential failures can cause serious problems not only to the population and economy but also to national security as well. The importance of these infrastructures calls for measures toward their security and protection. The aim was the reduction of risk related to natural disasters, terrorist acts, and cyberthreats. Traditional security systems, even those that employ intelligent algorithms, fail to prevent advanced zero-day attacks as they require constant training. This research proposes a novel meta-learning architecture that considers the neural turing machines as the approach upon which the model is founded. The introduced model allows for the memorization of useful data from past processes, by integrating external storage memory. Moreover, it facilitates the rapid integration of new information without the need for retraining. In particular, the proposed novel architecture is called memory-augmented neural network (M-ANN) whose core is a sophisticated, very fast, and highly efficient extreme learning machine. The M-ANN is assisted by a series of original modifications, related to fine-tuning of training, to memory retrieval mechanisms, to addressing techniques, and to ways of attention-weight allocation to memory vectors. The efficiency of the proposed system has been successfully tested using an extremely complex scenario for the protection of critical infrastructures. According to the testing scenario, memory could quickly encode and record information about new types of attacks, while any stored representation from previous experience was easily and consistently accessible, to maximize the detection efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mikhalevich IF, Trapeznikov VA (2019) Critical infrastructure security: alignment of views. Systems of signals generating and processing in the field of on Board Communications, Moscow, Russia, pp 1–5 Mikhalevich IF, Trapeznikov VA (2019) Critical infrastructure security: alignment of views. Systems of signals generating and processing in the field of on Board Communications, Moscow, Russia, pp 1–5
4.
Zurück zum Zitat Fan X, Fan K, Wang Y, Zhou R (2015) Overview of cyber-security of industrial control system. In: International conference on cyber security of smart cities, industrial control system and communications (SSIC), Shanghai, pp 1–7 Fan X, Fan K, Wang Y, Zhou R (2015) Overview of cyber-security of industrial control system. In: International conference on cyber security of smart cities, industrial control system and communications (SSIC), Shanghai, pp 1–7
5.
Zurück zum Zitat Virvilis N, Gritzalis D, Apostolopoulos T, (2013) Trusted computing vs. advanced persistent threats: can a defender win this game? In: Proceedings of 10th IEEE international conference on autonomic and trusted computing (ATC-2013), pp 396–403. IEEE Press Virvilis N, Gritzalis D, Apostolopoulos T, (2013) Trusted computing vs. advanced persistent threats: can a defender win this game? In: Proceedings of 10th IEEE international conference on autonomic and trusted computing (ATC-2013), pp 396–403. IEEE Press
7.
Zurück zum Zitat Grabowski LM, Bryson DM, Dyer FC, Ofria C, Pennock RT (2010) Early evolution of memory usage in digital organisms. In: ALIFE, pp 224–231 Grabowski LM, Bryson DM, Dyer FC, Ofria C, Pennock RT (2010) Early evolution of memory usage in digital organisms. In: ALIFE, pp 224–231
8.
Zurück zum Zitat Hassabis D, Kumaran D, Summerfield C, Botvinick M (2017) Neuroscienceinspired artificial intelligence. Neuron 95(2):245–258CrossRef Hassabis D, Kumaran D, Summerfield C, Botvinick M (2017) Neuroscienceinspired artificial intelligence. Neuron 95(2):245–258CrossRef
9.
Zurück zum Zitat Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder–decoder for statistical machine translation. In: Proceedings of the 2014 conference on empirical methods in natural language processing, pp 1724–1734 Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder–decoder for statistical machine translation. In: Proceedings of the 2014 conference on empirical methods in natural language processing, pp 1724–1734
10.
Zurück zum Zitat Graves A, Mohamed A-R, Hinton G (2013) Speech recognition with deep recurrent neural networks. In: IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 6645–6649. IEEE Graves A, Mohamed A-R, Hinton G (2013) Speech recognition with deep recurrent neural networks. In: IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 6645–6649. IEEE
11.
Zurück zum Zitat Sundermeyer M, Alkhouli T, Wuebker J, Ney H (2014) Translation modeling with bidirectional recurrent neural networks. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 14–25 Sundermeyer M, Alkhouli T, Wuebker J, Ney H (2014) Translation modeling with bidirectional recurrent neural networks. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 14–25
12.
Zurück zum Zitat Rawal A, Miikkulainen R (2016) Evolving deep LSTM-based memory networks using an information maximization objective. In: Proceedings of the 2016 on genetic and evolutionary computation conference, pp 501–508 Rawal A, Miikkulainen R (2016) Evolving deep LSTM-based memory networks using an information maximization objective. In: Proceedings of the 2016 on genetic and evolutionary computation conference, pp 501–508
13.
Zurück zum Zitat Giraud-Carrier C (2008) Metalearning: a tutorial. In: Tutorial at the 7th international conference on machine learning and applications (ICMLA), San Diego, California, USA Giraud-Carrier C (2008) Metalearning: a tutorial. In: Tutorial at the 7th international conference on machine learning and applications (ICMLA), San Diego, California, USA
14.
Zurück zum Zitat Santoro A, Sergey B, Matthew B, Daan W, Lillicrap TP (2016) Meta-learning with memory-augmented neural networks. In: ICML Santoro A, Sergey B, Matthew B, Daan W, Lillicrap TP (2016) Meta-learning with memory-augmented neural networks. In: ICML
17.
Zurück zum Zitat Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489–501CrossRef
19.
Zurück zum Zitat Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37CrossRef
21.
Zurück zum Zitat Hurst W, Merabti M, Fergus P (2014) A survey of critical infrastructure security. In: Butts J., Shenoi S (eds) critical infrastructure protection VIII. IFIP advances in information and communication technology, ICCIP 2014, vol 441. Springer, Berlin Hurst W, Merabti M, Fergus P (2014) A survey of critical infrastructure security. In: Butts J., Shenoi S (eds) critical infrastructure protection VIII. IFIP advances in information and communication technology, ICCIP 2014, vol 441. Springer, Berlin
22.
Zurück zum Zitat HoseinyFarahabady M, Taheri J, Tari Z, Zomaya AY (2017) A dynamic resource controller for a lambda architecture. In: Proceedings of the 2017 46th international conference on parallel processing (ICPP), Bristol, UK, pp 332–341. https://doi.org/10.1109/icpp.2017.42 HoseinyFarahabady M, Taheri J, Tari Z, Zomaya AY (2017) A dynamic resource controller for a lambda architecture. In: Proceedings of the 2017 46th international conference on parallel processing (ICPP), Bristol, UK, pp 332–341. https://​doi.​org/​10.​1109/​icpp.​2017.​42
23.
Zurück zum Zitat Suthakar U, Magnoni L, Smith DR, Khan A (2016) Optimised lambda architecture for monitoring WLCG using spark and spark streaming. In: Proceedings of the 2016 IEEE nuclear science symposium, medical imaging conference and room-temperature semiconductor detector workshop (NSS/MIC/RTSD), Strasbourg, France, pp 1–2. https://doi.org/10.1109/nssmic.2016.8069637 Suthakar U, Magnoni L, Smith DR, Khan A (2016) Optimised lambda architecture for monitoring WLCG using spark and spark streaming. In: Proceedings of the 2016 IEEE nuclear science symposium, medical imaging conference and room-temperature semiconductor detector workshop (NSS/MIC/RTSD), Strasbourg, France, pp 1–2. https://​doi.​org/​10.​1109/​nssmic.​2016.​8069637
25.
Zurück zum Zitat Yamato Y, Kumazaki H, Fukumoto Y (2016) Proposal of lambda architecture adoption for real time predictive maintenance. In: Proceedings of the 2016 fourth international symposium on computing and networking (CANDAR), Hiroshima, Japan, pp 713–715. https://doi.org/10.1109/candar.2016.0130 Yamato Y, Kumazaki H, Fukumoto Y (2016) Proposal of lambda architecture adoption for real time predictive maintenance. In: Proceedings of the 2016 fourth international symposium on computing and networking (CANDAR), Hiroshima, Japan, pp 713–715. https://​doi.​org/​10.​1109/​candar.​2016.​0130
Metadaten
Titel
Critical infrastructure protection based on memory-augmented meta-learning framework
verfasst von
Xie Bing
Publikationsdatum
24.02.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 23/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04760-7

Weitere Artikel der Ausgabe 23/2020

Neural Computing and Applications 23/2020 Zur Ausgabe

S.I. : Emerging applications of Deep Learning and Spiking ANN

Building an efficient OCR system for historical documents with little training data

S.I. : Emerging applications of Deep Learning and Spiking ANN

The effect of reduced training in neural architecture search