Next Article in Journal
Dynamic Response and Failure Process of a Counter-Bedding Rock Slope under Strong Earthquake Conditions
Previous Article in Journal
A Quadruple Integral Involving Chebyshev Polynomials Tn(x): Derivation and Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System

by
Nikolai Vladimirovich Korneev
1,2,*,
Julia Vasilievna Korneeva
3,
Stasis Petrasovich Yurkevichyus
4 and
Gennady Ivanovich Bakhturin
5
1
Department of Security Management of Complex Systems, National University of Oil and Gas Gubkin University, Leninsky Prospect, 65, 119991 Moscow, Russia
2
Scientific Research Center of Improving Protective Measures, All-Russian Research Institute for Civil Defence of the EMERCOM of Russia, Davydkovskaya st., 7, 121352 Moscow, Russia
3
Department of Hospitality and Intercultural Communication, Volga Region State University of Service, Gagarin st., 4, 445017 Togliatti, Russia
4
Department of Research of Scientific, Technical and Innovative Activities in Information and Telecommunication Technologies, Scientific Research Institute–Federal Research Centre for Projects Evaluation and Consulting Services, Antonova-Ovseenko st., 13, Bldg. 1, 123995 Moscow, Russia
5
Scientific Research Institute–Federal Research Centre for Projects Evaluation and Consulting Services, Antonova-Ovseenko st., 13, Bldg. 1, 123995 Moscow, Russia
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(1), 102; https://doi.org/10.3390/sym14010102
Submission received: 8 December 2021 / Revised: 26 December 2021 / Accepted: 4 January 2022 / Published: 7 January 2022

Abstract

:
We identified a set of methods for solving risk assessment problems by forecasting an incident of complex object security based on incident monitoring. The solving problem approach includes the following steps: building and training a classification model using the C4.5 algorithm, a decision tree creation, risk assessment system development, and incident prediction. The last system is a predicative self-configuring neural system that includes a SCNN (self-configuring neural network), an RNN (recurrent neural network), and a predicative model that allows for determining the risk and forecasting the probability of an incident for an object. We proposed and developed: a mathematical model of a neural system; a SCNN architecture, where, for the first time, the fundamental problem of teaching a perceptron SCNN was solved without a teacher by adapting thresholds of activation functions of RNN neurons and a special learning algorithm; and a predicative model that includes a fuzzy output system with a membership function of current incidents of the considered object, which belongs to three fuzzy sets, namely “low risk”, “medium risk”, and “high risk”. For the first time, we gave the definition of the base class of an object’s prediction and SCNN, and the fundamental problem of teaching a perceptron SCNN was solved without a teacher. We propose an approach to neural system implementation for multiple incidents of complex object security. The results of experimental studies of the forecasting error at the level of 2.41% were obtained.

1. Introduction

Symmetry is characterized as an option in terms of reformation and modification. The 21st century is characterized by a worldwide desire for digital modernization in many areas of human life. Research on innovative digital development needs to be carried out symmetrically and must penetrate into all areas of the global community. Today, there is an asymmetry of scientific contribution in the study of issues of digital innovation, both in technical areas and in the humanities. The reason for this situation is that the problem of the cognition of digital innovations is associated, first of all, with data mining, machine learning, cyber data, and the Internet of things, which belong to the field of technical sciences. However, when analyzing the problem of the formation of digital modernization, it will be meager and asymmetric if we do not take into account the socio-economic aspect, such as the persistence and reliability of digital transformation.
Mathematics and information technology is a multifunctional scientific basis that provides solutions to many issues related to the field of both technical and economic sciences, especially in the field of complex security.
The rapid development of information technologies opens up new prospects in the information processing system development. Their structure changes fundamentally. At the same time, regulatory requirements are being tightened, especially in terms of complex object security [1]. For the FEC (fuel and energy complex) of Russia, it is connected with current and recently adopted normative documents, such as: the energy security doctrine of the Russian Federation (Decree of the President of the Russian Federation, 13 May 2019, № 216); the new version of the information security doctrine (Decree of the President of the Russian Federation № 646, dated 05 December 2016); federal law, 26 July 2017, № 187-FL, “On the Security of the Russian Federation Critical Data Infrastructure”; federal law, 21 July 2011, № 256-FL, “On the safety of fuel and energy complex facilities”; and federal law, 27 July 2006, № 149-FL, “About information, information technology and data security” [1]. In these documents, the priority is given to the fuel and energy complex object [1] security on the basis of the threat monitoring of its functioning. These issues are also relevant for the global fuel and energy industry. The report [2] indicates: «At the same time, intense financial strain is hurting the industry, including companies who own and operate critical infrastructure facilities. Policy makers and regulators need to ensure that operational, maintenance and safety expenditures are prioritised and appropriately maintained».
In this case, threat monitoring of any object’s functioning is a relevant issue that is currently being implemented using the following technologies regarding the example of FEC objects:
  • Monitoring using separate, usually heterogeneous security systems: physical [3,4]; economic [5,6]; fire [7,8]; informational [9,10]; intellectual property security, such as data loss prevention; technogenic [11,12]; psychological; security against terrorism [13]; ecological safety [14]; and power security [5,15], where there is no integration of information flows of security threats (events, violations, and incidents) between them for the purpose of collecting, processing, comprehensively analyzing, and forecasting risks and undesired events.
  • Monitoring using models and algorithms to support security management with an observer [9,10,16,17,18] to make a final decision based on a specific security system model.
Today, predicative analytics [19] is a global trend [20,21]. It is primarily due to the big data phenomenon which requires new methods of information processing, such as data mining. Experts believe [22,23] that it opens up new prospects for security tasks, including the threat monitoring of any object’s functioning.
There are attempts to create such solutions by individual domestic companies such as Kaspersky Industrial CyberSecurity, Kaspersky Machine Learning for Anomaly Detection of Kaspersky Lab, KOMRAD of NPO (scientific-industrial association) ECHELON, VipNet Industrial Security of INFOTECS, etc. These companies face a lack of domestic digital technologies for a number of security tasks in the field of data mining, artificial intelligence, and predictive analytics. There are foreign solutions that are more widely available on the market, for example, the security control system MAXPATROL of Positive Technologies, the EcoStruxure architecture of Schneider Electric, the Predix platform of General Electric, etc. They do not take into account the possibility of using artificial intelligence and predictive analytics for a number of security tasks as well as domestic solutions.
It should be noted that in the platform Predix of General Electric, it is stated that machine learning algorithms are used for solving analytical problems, first of all, to detect anomalies in data flows about the industrial equipment state. Predix should be considered exclusively as an analytical platform for monitoring an industrial equipment state; however, there is a number of objectively complex issues. There is no open information about the security of Predix machine learning algorithms’ software implementations, which has a potential threat to information security at several OSI model levels. The platform architecture of IIoT and Predix analytical applications can be performed both in the cloud and on-premises, i.e., at the edge level. This fact causes doubts about the possibility of platform deployment according to the regulator requirements (Order of the Ministry of Energy of the Russian Federation № 1015, dated 6 November 2018), which establishes the need for data processing centers to be located on the territory of the Russian Federation.
Thus, we can distinguish the following promising technologies for the threat monitoring of any object’s functioning:
  • The complex security monitoring of an object considering the integration of information flows of security threats and events, including the critical systems security [24,25] and their processing using artificial intelligence [26,27,28];
  • Monitoring using integrated security management support algorithms [12,29] and component models that include reasonable intruder models and digital object models constructed by digital structures, such as information models [17], neural networks [12], or a neurographs [30]; and
  • Monitoring based on predicative models [19,26,28] using current states and historical events about the incident on an object to forecast future incident.
Today, the last technology is hardly implemented for security systems [21]. This is critical for the whole class of risk analysis techniques and methods that are used nowadays for security systems, including [31,32,33]: «brainstorming», structured and semi-structured questionnaires, the Delphi method, check lists, scenario analysis, Business Impact Analysis (BIA), fault tree analysis, event tree analysis, cause-and-effect analysis, layers of protection analysis, decision tree analysis, the Human Reliability Assessment (HRA), bow tie analysis, the Markov chain Queueing theory, the Monte Carlo method, the Bayesian approach and Bayesian networks, FN curves, the index method, the probability and impact matrix, Multicriteria analysis, etc. Most of these methods and risk analysis methods solve the problem based on the specific security system model rather than on the complex object security model. Their application is also limited in terms of integrating information flows of security threats and events; their processing and risk assessment using artificial intelligence; as well as risk accounting for a specific intruder model and a digital object model (Digital Twin). Almost all of these techniques and methods are not applicable to big data and they do not implement all the features of data mining in predictive analytics. This explains the limited use for different objects, including the fuzzy final output relative to the current object states.
The approach proposed in the article is devoted to risk assessment problem solving by predicting an incident of complex object security based on incident monitoring. The item of the study is to forecast and assess the risk of the complex security of an object based on main security requirements. The subject of the study is a system for the risk assessment and forecasting of the complex security incidents of an object based on its monitoring. The purpose of the study is to improve the forecasting efficiency and complex security object risk assessment on the basis of data mining classification model formation according to safety requirements and complex security incident forecasting systems based on its monitoring.
At the end of this section, we discuss the novelty of the study. The obtained results allow us to quantify a reasonable risk from the occurrence of the future incident for any object, which is widely used in world practice, but the mathematical model is the basis for a new approach to the risk assessment of complex threats based on their monitoring.
The Decree of the President of the Russian Federation № 490, dated 10 October 2019, «On the development of artificial intelligence in the Russian Federation», directly indicates the relevance and necessity of creating such systems to ensure national security and law enforcement; improve employees’ safety when performing business processes (including forecasting risks and adverse events, and reducing the level of direct human participation in processes associated with an increased life and health risk); and ensure complex security system formation when creating, developing, implementing, and using artificial intelligence technologies.
At the same time, the solution of this task will contribute to the formation and development of unique complex security systems aimed at the identification, reflection, and elimination of existing and future operation threats, and to ensuring object security, including constant threat monitoring.
The solution of this task will contribute to allowing us to quantify a reasonable risk from the occurrence of the future incident for any object, which is widely used in world practice, but the mathematical model is the basis for a new approach to the risk assessment of complex threats based on their monitoring. The solution of this task will contribute to adding opportunities for the practical clarification of the current regulatory documents on the objects of critical information infra-structures of the Russian Federation; for a wider application of data mining algorithms and big data technologies when considering not only a physical object but also its digital twin; and for building security systems against complex threats and developing the neuro-graph theory of complex security.

2. Materials and Methods

Stages of a predicative model forming as a cybernetic predictive device were firstly described in [34] and their usage in the automatic control theory with artificial intelligence elements, as a predictive module, was described in [26]. Then, for the joint use with data mining, the stages were clarified in some domestic and foreign articles. For example, in [19], it is indicated that data mining methods can be used to form a predicative model, including the decision tree method, which is consistently recognized as the most popular practical method due to its simplicity and efficiency. Furthermore, we will follow the approach described in [26], taking into account data mining methods. The proposed approach for solving this problem includes:
  • Building and training a classification model. This step can be performed using data sampling that includes the finite precedents set, which are previous incidents at the site. For each incident, the main groups of security requirements are collected and analyzed. They are used to train the model that allows for identifying dependencies, patterns, and interrelations that correspond not only to the given sample but also to other parameters, even those that have not been observed yet. Data sets of object incidents with different parameters of each object (where the incident occurred) will be model attributes. For the classification model, we used the algorithm C4.5, which characterizes the class of each object. Using a set of object attributes and the corresponding class, the C4.5 algorithm builds a decision tree that can predict new object classes that were not previously considered regarding their attributes basis. Decision tree classification creates a flowchart for distributing new data. At the first stage, there were developed as an algorithm and program for data generation on the basis that the decision tree will be built. This algorithm is a kind of expert system that determines the acceptable range of values for the checked set. The range is created due to conditions that are formed in accordance with current regulatory documents, including that mentioned above.
  • The decision tree building. At the second stage, C4.5 builds a decision tree based on the data obtained as a result of the program. This tree is designed to speed up the process of predicting the incident of the checked set and identify possible security violations that may lead to an incident.
  • Development of the complex security risk assessment and incident forecasting system. The system is a predicative self-configuring neural system as a predication module [26], including a self-configuring neural network, a recurrent neural network, and a predicative model that allows for determining the risk and forecasting the probability of an incident for an object. The neural system is created on the principle of a base prediction class formation of an object, including historical events of an object’s incident and considering current object states by a fuzzy system of predicative model outputs for risk assessment and for forecasting future incident.
According to the definition given by the workshop managers [35], self-configuration is the process of selecting and using existing algorithmic components (such as operator variants). However, this definition is given exclusively for genetic algorithms. Then, it will be appropriate to define a SCNN (self-configuring neural network).
A self-configuring neural network is a neural network that self-configures neurons and connections between them on the basis of the prediction class of an object.
SCNN can be trained with or without a teacher depending on what neurons are used in the neural network. A perceptron [36], a sigmoid neuron [37,38], and an adaline neuron [39] can only be trained with a teacher. The instar and outstar neurons proposed by Grossberg S. can be trained with or without a teacher. A teacher is not required to train WTA-type neurons [37,38,40]. Learning with a teacher requires an “external” teacher who evaluates the behavior of the system and manages its subsequent modifications. When teaching without a teacher, the network makes the required changes by self-organizing.
The most interesting aspect is the possibility of implementing the training of SCNN perceptrons without a teacher, which is theoretically possible by adaptive thresholds of the neuron activation function and a special learning algorithm.
To adapt thresholds, you need to be able to forecast them. Currently, various approaches are used for this purpose based on the probability theory [41] and mathematical statistics [42], the RNN (recurrent neural networks) [43], self-organization based on the competitive Kohonen rule [40], Hebb [44] or Gustafson Kessel [45], and the functional and correlation analysis of time series based on the Takens–Manet theory about the possibility of reconstructing the phase space of a dynamical system [26,46]. All these methods are used to find a certain measure of the considered set, namely the attractor. The attractor for a recurrent neural network is a stability point in the local minimum state space of the Lyapunov energy function [36,37,47]. Nowadays, RNN is widely used [48,49,50] in LSTM-based models using GRU and encoders–decoders in a combination of RNN and convolutional neural networks. In the work of [49], the network with LSTM-based architecture and encoders–decoders proved to be effective for detecting anomalous (critical) values, including for time series that do not contain information about external factors that affect the correlation between time series elements. A similar task is to forecast future threshold values based on historical threshold events without considering any other external factors that directly or indirectly affect the historical threshold.
The solution that we usually obtain requires clarification, especially regarding current incidents accounting for the examined object, risk assessment, and future incident forecasting, where the risk value is unclear and determined by the corresponding linguistic variable. Currently, fuzzy inference systems based on the principles of Zadeh fuzzy logic [51], the Wang–Mendel modeling method [52], and Takagi–Sugeno–Kang models [53] are widely used for this purpose.

3. Results

Many historical events (precedents) about the incident f at the objects:
W = { O 1 , O 2 , , O j , , O n } ,
where O j is an examined object occur.
Each object is characterized by a set of variables:
O j = { B 1 , B 2 , , x l , , x L , K 1 , K 2 , , K h j , , K mj , V j , T j } ,
where x l are independent base variables whose values are known and on which the basis of the set of the object’s base class is defined; K hj are independent functional variables whose values are known and on which the basis of the value of the dependent variable is determined for V j ; and T j is the time of the incident on the object.
Furthermore, using the concept of data mining as an analogy close to predictive analytics [19], we write a set of independent base variables in the form of a variables set (3) for the object under study:
B j = { B 1 , B 2 , , x l , x L } ,
where each variable x l can receive the value from the set (4):
P lj = { m l 1 , m l 2 , , . m lj } .
The variable set of the examined object is as follows:
O i = { B 1 , B 2 , , x r , , x R , K 1 , K 2 , , K hi , , K mi , V i , T i } ,
where x r are independent base variables whose value is known; K hi are independent functional variables whose value is known and on which the basis of the value of the dependent variable is determined for V i ; and T i is the time of the incident on the examined object.
In real-time mode T i , the object can have a number of current states. These states make up the set [29]:
S = { S 1 , S 2 , , S N } ,
where S 1 , S 2 , , S N are current states.
The subject will be notified about each of them by event alerts (7) I n f z [29]:
I n f z = { I n f z 1 , I n f z 2 , , I n f z R } ,
It is assumed that the number of object states N is not equal to the number of event alerts (8), One object state is reported by several event alerts D :
N D , I n f z i ( S i ) = r i ,
where r i is a number of event alerts that report the object status S i .
For the object under study, we write the variables set by analogy (9) B i :
B i = { B 1 , B 2 , , x r , x R } ,
and the set (10) P ri :
P ri = { m r 1 , m r 2 , , . m ri } .
Then, the set of the base product class for the object under study is as follows:
O Base = W , ( x l = x r ) ( m lj = m ri ) .
Explain Equation (11) and therefore the definition of the base product class should be as follows. The base prediction class includes all possible historical events of the incident f on objects, for which there are two requirements: all elements of the independent basic variables set are equal to the set of the examined object and all elements of the set for each variable of the independent basic variable set are equal to the elements of the examined object set.
Let us write an independent functional variable set as a variables set (12) for the object under study:
K j = { K 1 , K 2 , , K hj , , K mj } .
Each variable K hj can receive the value from the set [ 0 1 ] , determined by a cause-and-effect relation f K hj :
M hj = { m h 1 , m h 2 , , . m hj } .
The most optimal method of risk analysis from the discussion in paragraph 2 can be used to form the selected set (13) of each specific object. To form the specified set, the author uses the class of each object and the decision tree C4.5 built in paragraphs 1 and 2, where the variable K hj can receive the value from a discrete set [ 0 ; 1 ] . It should be noted that in most cases, for historical events of an incident, the cause–effect relationship is already established by the relevant competent authorities.
For the examined object, let us write the variables set (14):
K i = { K 1 , K 2 , , K hi , , K mi } .
Each variable K hi can receive the value from the set [ 0 1 ] , defined in the result of preventive, supervisory, or expert actions in relation to the object based on the current regulatory documents and technical regulations that determine safe object operation:
M hi = { m h 1 , m h 2 , , m hi } .
To form the specified set (15) for each particular object, the same risk analysis method should be used as for the set M hj ; however, the risk analysis is already performed for data obtained as a result of preventive, supervisory, or expert actions. To form the mentioned set, the author uses a similar approach of the set formation (10) where, for the class of each object, there is a decision tree C4.5, as built in paragraphs 1 and 2, on the basis of preventive, supervisory, and expert actions.
To determine the value of the dependent variable V i Base of the base prediction class of the object, the incident prediction system includes SCNN (Figure 1), which is taught without a teacher. SCNN architecture includes a three-layer feedforward network of the perceptron type, where K h are the input layer neurons corresponding to independent functional variables from (2) and received with (11); S x l are intermediate layer neurons corresponding to independent base variables (2) and with an adaptive activation function threshold S x l ; and S V are output layer neurons corresponding to the dependent variable value V j and with an adaptive activation function threshold S V .
In SCNN architecture, taking into account the basic prediction class, we solve the fundamental problem of teaching a perceptron neural network without a teacher. This ability to implement SCNN training without a teacher is provided by the presence of adaptive thresholds in the neural network for activation functions of intermediate and output layer neurons as well as a special learning algorithm.
To determine the adaptive threshold of the activation function S x l , let us use the fundamental concept of an elementary outcome ω [41] for the incident f . If the present moment of time is denoted as T real , then, for the set of historical events (1) about the incident f that occurred during the time T T real , all ω are identified. Then, the adaptive threshold of the activation function S x l for time T T real in the general view is distributions (probabilities) series P ( T T real ) discrete values T i and T j , taking into account the number of intermediate layer neurons K m :
S x l ( T T real ) = P ( T T real ) / K m = 1 / ω K m ,   ω = n ( T = T j ) = n ( T = T i ) .
To adapt the threshold to time T > T real , it is necessary to forecast time series S x l ( T > T real ) . This task can be formalized as follows. By values of an univariate time series S x l ( T T real ) = { S x l 1 ,   S x l 2 , , S x l z 1 , S x l z } , which characterizes the threshold values in z discrete equidistant moments of time T = { T 1 , T 2 , , T z 1 , T z } , it is necessary to determine the values of the following time series elements that make up the variables set S x l ( T > T real ) = { S x l z + 1 ,   S x l z + 2 , , S x l a 1 , S x l a } for relevant points in time T = { T z + 1 , T z + 2 , , T a 1 , T a } . The value a defines the time series forecast horizon S x l ( T > T real ) .
The value of sampling T is defined as (17):
Δ T = T z T z 1 = T real T z 1 = min [ ( T j T j 1 ) , ( T i T i 1 ) , | T j T i | ] 0 .
Then, the threshold values are S x l z for the time T T real considering (16) will be:
S x l z = 1 / ω K m , ( T Δ T ) .
The dimension formed on the basis of (18) time series S x l ( T T real ) is equal to the value z . The value a defines the time series forecast horizon S x l ( T > T real ) . The optimal set of parameters z and a can be found experimentally.
To solve the problem, we need to define the following functional dependency:
φ [ S x l ( T T real ) ] = S x l ( T > T real ) ,
where S x l ( T T real ) is the variable set used for forecasting ( | S x l ( T T real ) | = z ); S x l ( T > T real ) is the predicted values variable set ( | S x l ( T > T real ) | = a ); and φ is the dependence function between time series elements, which is set by the RNN internal structure.
The function φ is determined by pre-training the RNS model on a sample S x l ( T ) consisting of thresholds S x l z with an interval of Δ T . During the training, pairs of variable sets are iteratively selected from the sample [ S x l ( T T real ) , S x l ( T > T real ) ] using the algorithm (20), thus | S x l ( T T real ) | = z , | S x l ( T > T real ) | = a :
S x l ( T T real ) = { S x l i , S x l i + 1 , , S x l i + z 2 , S x l i + z 1 } ; S x l ( T > T real ) = { S x l i + z , S x l i + z + 1 , , S x l i + z + a 1 , S x l i + z + a } ; i = [ 1 ; | S x l ( T ) | z a ] .
Each pair of variable sets [ S x l ( T T real ) , S x l ( T > T real ) ] are inserted in (19) instead of S x l ( T T real ) and S x l ( T > T real ) , which changes the RNN internal structure under the task-defined regularities in the training data array, i.e., the model training and identification of φ .
The adaptive activation function threshold S V of the output layer neuron is defined by:
S V ( T ) = max [ S x l ( T ) ] / x L .
Physically, this means that the activator of the incident development is the cause-and-effect relationship K hj f , with the maximum value of the activation function threshold in time.
The proposed SCNN architecture (Figure 1) is not directly recurrent, i.e., there is no signal transfer from the output or hidden layer to the input layer [36,37,47,54,55,56]. Therefore, this fact must be taken into account when conducting the training process.
The SCNN network training occurs in several stages using a special algorithm:
1.
Configuration of SCNN architecture (Figure 1). A prerequisite for developing good abilities to generalize any neural network in the learning process is a competent identification of the Vapnik–Chervonenkis measure ( V C dim ) [47]. Then, for SCNN considering the proposed approach [57], we define the upper and lower bounds of this measure as:
2 [ S x L / 2 ] K j Base V C dim 2 N w ( 1 + lg N n ) ,
where [] indicates the whole part of the number; K j Base is the dimension of the variable set K j ; N w is the total number of network weights; N n is the total neurons’ number in the network; and w is the network weights.
From Equation (22), it follows that the lower range bound is approximately equal to the number of weights connecting the input and intermediate layer, and the upper bound exceeds double the total number of all network weights. From Equation (22), it is easy to obtain network configuration parameters (23), which must be performed both when configuring and reconfiguring the network.
К m K j Base ; S x L < N w ( 1 + lg N n ) K j Base + 1 ,
where the lower range bound S x L (24) is defined by the SCNN architecture and equal to
S x L = N w K j Base + 1 .
Thus, the neurons’ number in the intermediate layer is affected by the relation of the network weights’ number to the training samples’ number of the base prediction class O Base (11).
2.
Training of the RNN model and determination of both intermediate thresholds S x l ( T ) and output S V ( T ) layers by algorithm (20) and Equation (21). At this stage, it is necessary to determine the parameters of the sample in advance: S x l ( T ) , z , a . This can be done experimentally and will be shown later.
3.
Training of SCNN using a set of base prediction classes O Base (11). Generally, the learning algorithm will be determined by the type of neurons used in the neural network. For the SCNN of the perceptron type (Figure 1), the gradient method and the backpropagation [47] are used. In this case, required continuous activation functions for intermediate u S x l and output u S v layers are obtained by corresponding values’ approximation S x l ( T ) and S V ( T ) . This approach has the following physical meaning: at value K h = 0 , the probability of an incident f is 50%, which is equivalent to the threshold of its occurrence at time T T real . Then, for a unipolar sigmoid activation function u S x l ( K h ) [47] of the intermediate layer, we calculate the following.
u S x l ( K h ) = 1 1 + exp ( β 1 K h ) = 1 1 + exp ( β 1 S x l ) ,
where β 1 is the parameter, affecting the form of the activation function.
It is easy to show that Equation (25) can be written as:
exp ( β 1 K h ) = exp ( β 1 S x l ) ,
which leads to an exponential approximation of [42] S x l ( T ) by the function φ 1 [ S x l ( T ) ] = α 1 exp ( b 1 S x l ) :
exp ( β 1 S x l ) = α 1 exp ( b 1 S x l ) ,
where α 1 and b 1 are the approximating exponential function parameters.
Then, there is logarithmic Equation (27) and by applying products of logarithms to the right side of the equation, we obtain Equation (28) for β 1 :
β 1 = b 1 ln α 1 / S x l .
The final activation function equation u S x l ( K h ) of the intermediate layer, taking into account (26) and the limit value K h = 1 , is as follows:
u S x l ( K h ) = 1 1 + exp ( β 1 K h ) = 1 1 + exp [ ( b 1 + ln α 1 ) K h ] ,
where β 1 = b 1 ln α 1 is the parameter, affecting the activation function form.
From Equation (26), it is easy to obtain approximation error ε 1 , which will be equal to the known error ε φ 1 , and an exponential approximation of φ 1 [ S x l ( T ) ] , which is the mean-squared error [42] under conditions of the convergence of the sequence S x l ( T ) to zero in the mean square [41]:
ε 1 = | K h S x l | = ε φ 1 min .
Equations (29) and (30) mean the convergence of functions by probability based on the condition of convergence, with a probability equal to one (16), and convergence in the mean square [41]. The convergence of functions by probability implies a weak convergence of functions [58] assuming that the function u S x l ( K h ) is continuous and can only have a gap at points Δ T . It follows that ε 1 = ε φ 1 min .
By analogy, we obtain the final equation of the activation function u S v of the output layer (31) for an exponential approximation by a function of the form φ 2 [ S V ( T ) ] = α 2 exp ( b 2 S V ) including (21) and (29). Thus, we have:
u S v ( S x l ) = 1 1 + exp ( β 2 S x l ) = 1 1 + exp ( [ b 2 + x L ln α 2 ( 1 + exp ( b 1 + ln α 1 ) ) ] S x l ) ,
where β 2 = b 2 x L ln α 2 ( 1 + exp ( b 1 + ln α 1 ) ) is the parameter that affects the activation function form.
By analogy, we obtain the approximation error ε 2 (32) that is equal to the known mean-squared error ε φ 2 of exponential approximation φ 2 [ S V ( T ) ] :
ε 2 = | S x l S V | = ε φ 2 min .
The algorithm [47] ends when the norm of the gradient of the objective function | E | falls below the given value ε , which characterizes the accuracy of the learning process. For the SCNN of the perceptron type (Figure 1), this means that components of the gradient (33) for all weights w of intermediate w S x l and output w S V layers must be less or equal to the corresponding errors ε φ 1 and ε φ 2 :
E / w S x l ε φ 1 ;   E / w S V ε φ 2 .
To estimate the received Equations (29) and (30), it is possible through the corresponding confidence coefficients of R 2 to obtain the function’s approximation φ 1 [ S x l ( T ) ] and φ 2 [ S V ( T ) ] by the Fisher criterion [42]:
Φ = R 2 ( z a 1 ) a ( 1 R 2 ) .
From Equation (34), it is easy to obtain the reliability condition of the SCNN model:
R 2 > Φ kr a a ( Φ kr 1 ) + z 1 ,
where Φ kr is the critical value of the Fisher criterion from the Fisher distribution tables [42] for a given significance level γ and known parameters z and a .
Thus, the data for SCNN training is a base predication class O Base and the accuracy of its training ε φ 1 and ε φ 2 is determined by the network independently without a teacher.
4.
Completion of training.
5.
SCNN reconfiguration that includes a repetition of items 1–3 if there is information about changing the set of independent function variables or the set of independent base variables (2) or a repetition of items 2–3 if there is information about a new incident f in (1).
After network training, data from the object under study is fed to the network (5) and as a result, the value of the dependent variable is formed as V i Base for the base prediction class O Base (11). It should be noted that during the investigation, we obtain the value V i Base , not V i , as in the case of the classical neural network training approach [37,47]. This is due to the time difference between the time of the last network reconfiguration and the time T i if the total execution time (item 1 and 3) is approximately equal to 1 min [59]. Thus, it can be accepted as equal to:
Δ t = T i T real .
Furthermore, to refine the obtained results and form a predicative model, we will consider the variable V i as the membership function [51] V i ( S ) (6) includes three fuzzy sets, namely the “low risk”, “medium risk”, and “high risk” of an incident at the object. States S N (6) correspond to S 1 , the incident cause; S 2 , the incident consequence; and S 3 , the incident occurrence.
Membership functions are shown in Figure 2 and built considering both the analysis V i ( S ) from states S and assumptions that V i ( S 1 ) = V i Base for fuzzy sets “low risk”, “medium risk”, and “high risk”, as well as for the fuzzy set “medium risk”, has a symmetric triangular membership function relative to the central point of the event S 2 .
Then, the probability P i ( S ) (37) of the occurrence of a fuzzy event on the object under study, wherein S is a low, medium, or high-risk value of an incident, is determined by the formula [52,60]:
P i ( S ) = 1 N V i ( S N ) P ( S N ) = N = 1 3 V i ( S N ) P ( S N ) ,
where P ( S N ) is the probability of the occurrence of condition S N . If we assume the continuous uniform distribution [41] of state occurrence S N , we will derive:
P i ( low   risk ) = 1 N V i Base = 1 3 V i Base ; P i ( medium   risk ) = 1 N ( V i Base + 1 + V i Base ) = 1 3 ( 2 V i Base + 1 ) ; P i ( high   risk ) = 1 N ( [ 1 3 V i Base + 2 3 ] + 1 ) = 1 9 ( V i Base + 5 ) ,
where the value in square brackets is obtained by solving a system of equation V i ( S ) functions for the “medium risk” and “high risk” of an incident on the object.
Result (38) considers the concept of vagueness of the linguistic variables “low risk”, “medium risk”, and “high risk” of an incident at the site and each event is assigned the probability of its occurrence.
The obtained Equation (38) forms the basis of the fuzzy inference system [52,53] of the predicative model. Then, let us formulate the fuzzy rule inference system for the risk assessment and prediction of incident:
  • If S N = S 3 , then there is a “high risk” of an incident on the object. The incident is currently at the time T i or, with probability P i ( high   risk ) , will occur during T for reasons of current regulation violations corresponding to K hi or to random causes corresponding to K hj O Base (11).
  • If S N = S 2 then there is a “medium risk” of the incident. The incident will occur at time T with probability P i ( medium   risk ) by reasons of violations of existing regulatory documents that correspond to K hi or to random causes corresponding to K hj O Base (11).
  • If S N = S 1 there is a “low risk” of incident on the object. The incident is not occurring at the time T i or the incident will occur with the probability P i ( low   risk ) during the time T by reasons of violations of existing regulatory documents that correspond to K hi or to random causes corresponding to K hj O Base (11).
It should be noted that above, we discussed the situation with one incident f but this approach can be generalized to many incidents F (39); if accepted, the last set will be written as an extended form of the complex threat [27] and represented as the set W (1). Set S (6), which is the set of elementary threats T , and set R have a correlation between them:
F = { W , S , T , R } ;   | T | > 1 ;   | R | > 1 ,
where the elementary threat t i T is determined by the incident f i under the terms:
t i = f i S N = S 3 , [ P i ( S ) > 0.5 ] S N = S 2 , [ P i ( S ) > 0.5 ] .
Further arguments presented in [27] do not lose their meaning but rather they add opportunities for a wider application of data mining algorithms and big data technologies in building security systems against complex threats and develop the neurographic complex security theory. At the same time, taking into account the results obtained in this article, they allow us to solve an important problem of optimizing detector sets for an object considering (40) when maintaining the necessary level of object security from complex threats.

4. Experiment and Discussion

For practical use of the proposed incident prediction system, it is important to define optimal sets of independent basic and functional variables. The selection is made on the basis of a preliminary analysis of the object, taking into account the current regulatory documents. The most generalized approach to this analysis is described in [61] and is based on Peril Classification by the categories of geophysical, hydrological, meteorological, climatological, biological, and extraterrestrial. If one follows the approach of the Center for Security Studies (CSS) [62], such an analysis for a critical infrastructure object can be performed on the basis of a score resilience index, where variables are weighted by domain experts in collaboration with representatives of the critical infrastructure object on the basis of their relative importance compared to others. In Russia, the object categorization rules of critical information infrastructures of the Russian Federation (Decree Of the government of the Russian Federation № 127, dated 8 February 2018), which is a categorical approach to a critical infrastructure object evaluation, is defined, which is based on indicators of significance criteria including the social, political, economic, and environmental significance for national defense, state security, and law enforcement, related by category with measures to ensure the safety of the object (Order of the Federal Service for Technical and Export Control of Russia № 239, dated 25 December 2017). Taking this approach into account, data from current regulatory documents and technical regulations that determine the safe operation of an object can be used to determine variables.
For practical use of the proposed incident prediction system to conduct SCNN training without a teacher to also improve the performance of forecasting, we need to define the sample parameters in advance, namely S x l ( T ) , z , and a , and the network reconfiguration time Δ t . This can be done experimentally.
Assume that the sample S x l ( T ) consists of 1080 threshold values with an interval of Δ T = 30 s. During the minimal preprocessing of the training sample, the presence of missing values is checked and numeric values’ normalization is conducted to a range of [ 0 1 ] . The algorithm for creating and training the RNN model is implemented in Python using the open source TensorFlow library. The RNN architecture is a two-layered network with one layer of LSTM cells and one fully connected layer. The following parameter ranges are selected for experiments in minutes: a = [ 5 ; 10 ] with step 1 and z = [ 15 ; 30 ] with a step 2.5. During the experiment, we compared RNN-predicted threshold values with the actual ones using elements of a separately collected test sample as input and verification data, which was not used in the RNN training process. The forecast error, as part of the experiment, is usually calculated as a percentage as the module of the difference between the actual and predicted threshold value. The good value R 2 = 0.78 with a mean prediction error is 5.41% on the interval a and was received for the parameter z = 20 min (Figure 3).
The graph of the mean dependence (for all values of z ) of the forecast error on z is shown in Figure 4.
Based on the obtained results, we can provide the following conclusions.
  • The forecast error reduces when the amount of input data increases (Figure 4). The lowest value of the mean error for any forecast horizon is achieved when analyzing values for the previous 30 min.
  • Using the optimal set of parameters ( z = 20 and a = 10 ) gives the mean forecast error a 4.41% at the forecast horizon, equal to 10 min, which is a good result (Figure 3).
  • When using the optimal set of parameters ( z = 20 and a = 10 ) at the given significance level of γ = 10 % and at the value of the Fisher criterion Φ kr = 1.96 [42], critical value R 2 = 0.68 is obtained. The obtained result R 2 = 0.78 fully satisfies the requirement (35) that indicates the reliability of the SCNN model as a whole.
  • Saving the RNN forecast error at the level defined in the item 2 level is possible only if the SCNN reconfiguration period is longer than the forecast horizon: Δ t a . For the obtained results, this means that Δ t 10 min.
  • Further experimental work on optimizing the RNN parameters can improve the obtained solution and, if necessary, can allow for the selection of optimal parameters S x l ( T ) , z , and a , as well as for the reconfiguration time of SCNN Δ t for a specific object.
The obtained optimal sets of parameters ( z = 20 and a = 10 ) have great practical importance. Parameter a = 10 determines the risk time horizon but the parameter z = 20 defines the horizon of the response to the incident in terms of threat monitoring, which can be used to clarify existing regulatory documents. In paragraph 4 of the information procedure of the Russian Federal Security Service about computer incidents, responding to them, and taking measures to eliminate the consequences of computer attacks conducted in relation to significant objects of critical information infrastructures of the Russian Federation (Russian Federal Security Service order № 282, dated 19 June 2019), the response horizon for a computer incident related to the operation of a significant object of a critical information infrastructure is determined no later than 3 h from the moment of detection; for other objects, this is no later than 24 h from the moment of its detection. In this case, the obtained parameter z = 20 min (Figure 3), when the mean forecast error is 4.41%, is a good result.
If Δ t < a regarding what is possible at stage 5 of the network training, the RNN forecast error is a random variable during the reconfiguration period, but the SCNN error will be determined by a complex function of both the RNN forecast error and the SCNN training error. The last error is directly related to the time interval T of the readjustments of weights to new data of the base predication class, i.e., related to the constant update during the reconfiguration process. Considering Equation (36), the probability of such an error occurrence is equal to the probability of an incident occurrence during the reconfiguration period. Then, Δ t < a can be written as a condition under which the network reconfiguration may not be performed up to any value a :
Δ t Δ T ;   0.5 < P i ( S ) 1 .
Otherwise, the network reconfiguration is conducted relatively similarly to the last time T i Δ t . In fact, condition (41) means that the SCNN forecasted the occurrence of a future incident and the error of its training is insignificant.
Condition (41) can be used also for the forecast interval extension. However, in this case, we require an external teacher, which will determine the confidence values of the intervals P i ( S ) .
The SCNN error ε is able to be estimated by the value of the forecast error of RNN if we assume that the error ε φ 1 is approximately equal to the mean forecast error (item 2) ε φ 1 4.41 % and error ε φ 2 considering (21) will be approximately equal:
ε φ 2 = max ( ε φ 1 ) / x L ,
where the value max ( ε φ 1 ) , by analogy, can be defined from Figure 3. For the value a = 5 , max ( ε φ 1 ) = 7.22 %. If we assume that the number of independent base variables is x L = 3, then, by Equation (42), we will derive ε φ 2 2.41 % .

5. Conclusions

The solving problem approach includes the following steps: building and training a classification model using the C4.5 algorithm, a decision tree creation, risk assessment system development, and incident prediction. The last system is a predicative self-configuring neural system that includes a self-configuring neural network (SCNN), a recurrent neural network (RNN), and a predicative model that allows for determining the risk and for forecasting the probability of an incident for an object.
At the same time, considering the obtained results in this article, it is possible to solve an important problem of optimizing detector sets for an object while maintaining the necessary level of object security from complex threats.

Author Contributions

Conceptualization, N.V.K.; methodology, N.V.K.; software, N.V.K.; validation, N.V.K.; formal analysis, N.V.K. and J.V.K.; investigation, N.V.K. and J.V.K.; resources, N.V.K. and J.V.K.; data curation, N.V.K. and J.V.K.; writing—original draft preparation, N.V.K.; writing—review and editing, N.V.K.; visualization, N.V.K. and J.V.K.; supervision N.V.K.; project administration, S.P.Y. and G.I.B.; funding acquisition, S.P.Y. and G.I.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research study received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Archived datasets analyzed or generated by the study are in the database of the Federal Service for Technical and Export Control of Russia: https://bdu.fstec.ru/ (accessed on 20 November 2021). The open data paper and open data set can be found here: https://doi.org/10.1088/1757-899X/1047/1/012001 (accessed on 20 November 2020; Korneev and Merkulov 2020).

Acknowledgments

In-kind donations (such as materials used for experiments): https://doi.org/10.1088/1757-899X/1047/1/012001 (accessed on 20 November 2020; Korneev and Merkulov 2020).

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Korneev, N.V. Intelligent complex security management system FEC for the Industry 5.0. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 950, p. 012016. [Google Scholar]
  2. Global Energy Review 2020. Available online: https://iea.blob.core.windows.net/assets/7e802f6a-0b30-4714-abb1-46f21a7a9530/Global_Energy_Review_2020.pdf (accessed on 23 June 2020).
  3. Garcia, M.L. Design and Evaluation of Physical Protection Systems; Elsevier BV: Amsterdam, The Netherlands, 2008; pp. 263–271. [Google Scholar]
  4. Fennelly, L.J. CTPED and Traditional Security Countermeasures: 150 Things You Should Know; Taylor and Francis: Boca Raton, UK, 2018; pp. 22–28. [Google Scholar]
  5. Cao, J.; Wang, Y.; Zhu, C.; Zhang, Y.; Guo, C.; Cao, Y. CIM-based information model for power grid enterprise asset management and its application. Autom. Electr. Power Syst. 2012, 36, 77–81. [Google Scholar]
  6. Yu, Y.X.; Luan, W.P. Smart grid and its implementations. Chin. Soc. Electr. Eng. 2009, 29, 1–8. [Google Scholar]
  7. Danilov, A.I.; Mel’kov, S.A.; Solov’eva, N.V.; Mikryukovet, V.O.; Lyabakh, A.Y. Experience of Interaction between the Emercom of Russia and Roshy-dromet to Provide the Safety of Population and Territories in the Russian Arctic. Russ. Meteorol. Hydrol. 2019, 44, 300–304. [Google Scholar] [CrossRef]
  8. McNay, J.; Puisa, R.; Vassalos, D. Analysis of effectiveness of fire safety in machinery spaces. Fire Saf. J. 2019, 108, 102859. [Google Scholar] [CrossRef]
  9. Markov, A.S.; Barabanov, A.; Tsirlov, V. Periodic Monitoring and Recovery of Resources in Information Systems. In Probabil-istic Modeling in System Engineering; Kostogryzov, A., Ed.; IntechOpen: London, UK, 2018. [Google Scholar]
  10. Korneev, N.V. Algorithmic both Program Methods and Tools Estimation of Alternative Projects of the Guard Data Reduction System of Firm on the Basis of the Multicriteria Analysis; Sputnik+: Moscow, Russia, 2013. [Google Scholar]
  11. Oliveira, L.; Álvares, A. Axiomatic Design Applied to the Development of a System for Monitoring and Teleoperation of a CNC Machine through the Internet. Procedia CIRP 2016, 53, 198–205. [Google Scholar] [CrossRef] [Green Version]
  12. Wei, L.; Chuipin, K.; Qiang, N.; Jingguo, J.; Xionghui, Z. A method of NC machine tools intelligent monitoring system in smart factories. Robot. Comput.-Integr. Manuf. 2020, 61, 101842. [Google Scholar]
  13. Young, C. The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk; Butter-Worth-Heinemann: Boston, UK, 2014; pp. 321–357. [Google Scholar]
  14. Perez-Valdes, G.A.; Nørstebø, V.S.; Ellingsen, M.-B.; Teräs, J.; Werner, A.T. Bioeconomic Clusters—Background, Emergence, Localization and Modelling. Sustainability 2019, 11, 4611. [Google Scholar] [CrossRef] [Green Version]
  15. Vieira, A.C.; Houmb, S.H.; Insua, D.R. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity. In Electronic Proceedings in Theoretical Computer Science; Open Publishing Association: Waterloo, Australia, 2014; Volume 148, pp. 78–93. [Google Scholar]
  16. Fiaschetti, L.; Antunez, M.; Trapani, E.; Valenzuela, L.; Rubiales, A.; Risso, M.; Boroni, G. Monitoring and controlling energy distribution: Implementation of a distribution management system based on common information model. Int. J. Electr. Power Energy Syst. 2018, 94, 67–76. [Google Scholar] [CrossRef]
  17. Offergeld, T.; Knittel, M.; Bertram, R. Cimpyorm—a queryable python CIM-Cache for smart grid applications. In Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, 29 September–2 October 2019; pp. 1–5. [Google Scholar]
  18. Korneev, N.V. Principles of construction actual technical systems with elements of artificial intellect. Tekhnika Mashinostroeniya 2008, 66, 2–7. [Google Scholar]
  19. Siegel, E. Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die, Revised and Updated; John Wiley&Sons: Hoboken, NJ, USA, 2016; pp. 147–185. [Google Scholar]
  20. Sengupta, S.; Basak, S.; Saikia, P.; Paul, S.; Tsalavoutis, V.; Atiah, F.; Ravi, V.; Peters, A. A review of deep learning with special emphasis on architectures, applications and recent trends. Knowl. Based Syst. 2020, 194, 105596. [Google Scholar] [CrossRef] [Green Version]
  21. Re-inventing Internal Controls in the Digital Age. Available online: https://www.pwc.com/sg/en/publications/assets/reinventing-internal-controls-in-the-digital-age-201904.pdf (accessed on 23 June 2020).
  22. Anavangot, V.; Menon, V.G.; Nayyar, A. Distributed Big Data Analytics in the Internet of Signals. In Proceedings of the 2018 International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 23–24 November 2018; pp. 73–77. [Google Scholar]
  23. Chan, K.Y.; Kwong, C.; Wongthongtham, P.; Jiang, H.; Fung, C.K.; Abu-Salih, B.; Liu, Z.; Wong, T.; Jain, P. Affective design using machine learning: A survey and its prospect of conjoining big data. Int. J. Comput. Integr. Manuf. 2020, 33, 645–669. [Google Scholar] [CrossRef] [Green Version]
  24. Bou-Harb, E.; Neshenko, N. Cyber Threat Intelligence for the Internet of Things; Springer: Singapore, 2020; pp. 77–84. [Google Scholar]
  25. Aoudi, W.; Almgren, M. A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments. Int. J. Crit. Infrastruct. Prot. 2020, 30, 100377. [Google Scholar] [CrossRef]
  26. Korneev, N.V.; Kustarev, Y.S.; Morgovsky, Y.Y. Theory Automatic Control with Workshop; Academia: Moscow, Russia, 2008. [Google Scholar]
  27. Korneev, N.; Merkulov, V. Intellectual analysis and basic modeling of complex threats. CEUR Workshop Proc. 2019, 2603, 23–28. [Google Scholar]
  28. Dakheel, A.H.; Dakheel, A.H.; Abbas, H.H. Intrusion detection system in gas-pipeline industry using machine learning. Period. Eng. Nat. Sci. 2019, 7, 1030–1040. [Google Scholar]
  29. Korneev, N.V.; Goncharov, V.A. Mathematical model support management of complex safety objects social sphere with mass stay of people. Estestv. Tekhnicheskie Nauk. 2018, 118, 277–281. [Google Scholar]
  30. Korneev, N.V. A Neurograph as a Model to Support Control Over the Comprehensive Objects Safety for BIM Technologies. IOP Conf. Ser. Earth Environ. Sci. 2019, 224, 012021. [Google Scholar] [CrossRef]
  31. Barabanov, A.V.; Dorofeev, A.V.; Markov, A.S.; Tsirlov, V.L. Seven Secure Information Technologies; DMK Press: Moscow, Russia, 2017. [Google Scholar]
  32. IEC 31010:2019 Risk Management—Risk Assessment Techniques. Available online: https://www.iso.org/standard/72140.html (accessed on 23 June 2020).
  33. Cox, L.A. What’s Wrong with Risk Matrices? Risk Anal. 2008, 28, 497–512. [Google Scholar]
  34. Ivakhnenko, A.G.; Lapa, V.G. Cybernetic Predictive Devices; Publishing Naukova Dumka: Kiev, Ukraine, 1965. [Google Scholar]
  35. Iordache, S. Consultant-Guided Search Algorithms with Local Search for the Traveling Salesman Problem. Comput. Vis. 2010, 6239, 81–90. [Google Scholar]
  36. Hertz, J.; Krogh, A.; Palmer, R.G.; Horner, H. Introduction to the Theory of Neural Computation. Phys. Today 1991, 44, 70. [Google Scholar] [CrossRef] [Green Version]
  37. Haykin, S. Neural Networks and Learning Machines; Pearson Education: New York, NJ, USA, 2009. [Google Scholar]
  38. Osowski, S. Sieci Neuronowe do Przetwarzania Informacji; Oficyna Wydawnicza Politechniki Warszawskiej: Warszawa, Poland, 2006. [Google Scholar]
  39. Widrow, B.; Winter, R.G.; Baxter, R.A. Layered neural nets for pattern recognition. IEEE Trans. Acoust. Speech Signal Process. 1988, 36, 1109–1118. [Google Scholar] [CrossRef] [Green Version]
  40. Kohonen, T. The self-organizing map. Proc. IEEE 1990, 78, 1464–1480. [Google Scholar] [CrossRef]
  41. Pechinkin, A.V.; Teskin, O.I.; Tsvetkova, G.M.; Bocharov, P.P.; Kozlov, N.E. Probability Theory; Moscow, Bauman MSTU Publ: Moscow, Russia, 2004. [Google Scholar]
  42. Snedecor, G.W.; Cochran, W.G. Statistical Methods; Iowa State University Press: Ames, IA, USA, 1989. [Google Scholar]
  43. Rumelhart, D.E.; Hinton, G.E.; Williams, R.J. Learning representations by back-propagating errors. Nature 1986, 323, 533–536. [Google Scholar] [CrossRef]
  44. Hebb, D.O. Organization of Behavior; Wiley: Hoboken, NJ, USA, 1949. [Google Scholar]
  45. Igelnik, B.; Zurada, J.M. Efficiency and Scalability Methods for Computational Intellect; IGI Global: Hershey, PA, USA, 2013. [Google Scholar]
  46. Takens, F. Detecting strange attractors in turbulence. In Dynamical Systems and Turbulence; Lecture Notes in Mathematics; Rand, D., Young, L.S., Eds.; Springer: Berlin/Heidelberg, Germany, 1980; Volume 898, pp. 366–381. [Google Scholar]
  47. Hopfield, J.J.; Tank, D.W. “Neural” computation of decisions in optimization problems. Biol. Cybern. 1985, 52, 141–152. [Google Scholar] [CrossRef]
  48. Karpathy, A. The Unreasonable Effectiveness of Recurrent Neural Networks. Available online: http://karpathy.github.io/2015/05/21/rnn-effectiveness/ (accessed on 23 June 2020).
  49. Malhotra, P.; Ramakrishnan, A.; Anand, G.; Vig, L.; Agarwal, P.; Shroff, G. LSTM-Based Encoder-Decoder for Multi-Sensor Anomaly Detection. Available online: https://arxiv.org/pdf/1607.00148.pdf (accessed on 23 June 2020).
  50. Chen, J.; Deng, L.A. New Method for Learning Deep Recurrent Neural Networks. Available online: https://arxiv.org/pdf/1311.6091v1.pdf (accessed on 23 June 2020).
  51. Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
  52. Xue, Q.; Hu, Y.; Tompkins, W.J. A neural network weight pattern study with ECG pattern recognition. In Proceedings of the Images of the Twenty-First Century. Proceedings of the Annual International Engineering in Medicine and Biology Society, Seattle, WA, USA, 9–12 November 2003; p. 3776495. [Google Scholar]
  53. Takagi, T.; Sugeno, M. Fuzzy Identification of Systems and Its Applications to Modeling and Control. IEEE Trans. Syst. Man Cybern. 1985, SMC–15, 116–132. [Google Scholar] [CrossRef]
  54. Kosko, B. Bidirectional associative memories. IEEE Trans. Syst. Man Cybern. 1988, 18, 49–60. [Google Scholar] [CrossRef] [Green Version]
  55. Lippmann, R.P. An introduction to computing with neural nets. Pres. Messag. 1987, 4, 4–22. [Google Scholar] [CrossRef]
  56. Williams, R.J.; Zipser, D. A Learning Algorithm for Continually Running Fully Recurrent Neural Networks. Neural Comput. 1989, 1, 270–280. [Google Scholar] [CrossRef]
  57. Vapnik, V.N.; Chervonenkis, A.Y. On the Uniform Convergence of Relative Frequencies of Events to Their Probabilities. Theory Probab. Appl. 1971, 16, 264–280. [Google Scholar] [CrossRef]
  58. Wentzel, E.S. Probability Theory; Publishing Higher School: Moscow, Russia, 1998. [Google Scholar]
  59. Demuth, H.; Beale, M. Neural Network Toolbox for Use with Matlab; The MathWorks: Natick, MA, USA, 1992. [Google Scholar]
  60. Kasabov, N.K. Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering; MIT Press: Cambridge, MA, USA, 1996; 550p. [Google Scholar]
  61. Irdr Data Project Publishes Peril Classification and Hazard Glossary. Available online: https://www.irdrinternational.org/news/174 (accessed on 23 June 2020).
  62. Measuring Critical Infrastructure Resilience: Possible Indicators. Available online: https://www.research-collection.ethz.ch/handle/20.500.11850/111442 (accessed on 23 June 2020).
Figure 1. Self-configuring neural network architecture.
Figure 1. Self-configuring neural network architecture.
Symmetry 14 00102 g001
Figure 2. Membership function V i ( S ) .
Figure 2. Membership function V i ( S ) .
Symmetry 14 00102 g002
Figure 3. Dependence of the mean forecast error on a when z = 20 min.
Figure 3. Dependence of the mean forecast error on a when z = 20 min.
Symmetry 14 00102 g003
Figure 4. Dependence of the mean (by all values of z ) forecast errors on z .
Figure 4. Dependence of the mean (by all values of z ) forecast errors on z .
Symmetry 14 00102 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Korneev, N.V.; Korneeva, J.V.; Yurkevichyus, S.P.; Bakhturin, G.I. An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System. Symmetry 2022, 14, 102. https://doi.org/10.3390/sym14010102

AMA Style

Korneev NV, Korneeva JV, Yurkevichyus SP, Bakhturin GI. An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System. Symmetry. 2022; 14(1):102. https://doi.org/10.3390/sym14010102

Chicago/Turabian Style

Korneev, Nikolai Vladimirovich, Julia Vasilievna Korneeva, Stasis Petrasovich Yurkevichyus, and Gennady Ivanovich Bakhturin. 2022. "An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System" Symmetry 14, no. 1: 102. https://doi.org/10.3390/sym14010102

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop