Skip to content

Latest commit

 

History

History

operational-technology

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Industrial Control System (ICS) Cyber Attack Detection

Model Overview

Description:

  • The model is a multi-class XGBoost classifier that predicts each event on a power system based on dataset features.

References(s):

Model Architecture:

Architecture Type:

  • Gradient Boosting

Network Architecture:

  • XGBOOST

Input: (Enter "None" As Needed)

Input Format:

  • Tabular format in which the dataset features contain synchrophasor measurements and data logs from Snort, a simulated control panel, and relays.

Input Parameters:

  • N/A

Other Properties Related to Output:

  • N/A

Output: (Enter "None" As Needed)

Output Format:

  • Natural Events, No Events or Attack Events

Output Parameters:

  • N/A

Other Properties Related to Output:

  • N/A

Requirements

  • Requirements can be installed with

pip install -r requirements.txt

  • and for p7zip

apt update apt install p7zip-full p7zip-rar

Software Integration:

Runtime(s):

  • Morpheus

Supported Hardware Platform(s):

  • Ampere/Turing

Supported Operating System(s):

  • Linux

Model Version(s):

  • v1

Training & Evaluation:

Training Dataset:

Link:

Properties (Quantity, Dataset Descriptions, Sensor(s)):

  • There are 78377 rows in the dataset.

Dataset License:

Evaluation Dataset:

Link:

Properties (Quantity, Dataset Descriptions, Sensor(s)):

  • There are 78377 rows in the dataset.

Dataset License:

Inference:

Engine:

  • Triton

Test Hardware:

  • Other

Subcards

Model Card ++ Bias Subcard

What is the gender balance of the model validation data?

  • Not Applicable

What is the racial/ethnicity balance of the model validation data?

  • Not Applicable

What is the age balance of the model validation data?

  • Not Applicable

What is the language balance of the model validation data?

  • Not Applicable

What is the geographic origin language balance of the model validation data?

  • Not Applicable

What is the educational background balance of the model validation data?

  • Not Applicable

What is the accent balance of the model validation data?

  • Not Applicable

What is the face/key point balance of the model validation data?

  • Not Applicable

What is the skin/tone balance of the model validation data?

  • Not Applicable

What is the religion balance of the model validation data?

  • Not Applicable

Individuals from the following adversely impacted (protected classes) groups participate in model design and testing.

  • Not Applicable

Describe measures taken to mitigate against unwanted bias.

  • Not Applicable

Model Card ++ Explainability Subcard

Name example applications and use cases for this model.

  • It's primarily for testing purposes Natural Events, No Events and Attack Events can be detected in an Industrial Control System

Fill in the blank for the model technique.

  • This model is intended for developers who want to test the model that can detect different events in the example Operational Technologies dataset.

Name who is intended to benefit from this model.

  • This model is intended for users who want to test with models that can differentiate Natural Events, No Events and Attack Events.

Describe the model output.

  • This model outputs one of these results: Natural Events, No Events and Attack Events

List the steps explaining how this model works.

  • An XGBoost model gets trained with the dataset, and in inference, the model predicts one of the multiple classes for each row.

Name the adversely impacted groups (protected classes) this has been tested to deliver comparable outcomes regardless of:

  • Not Applicable

List the technical limitations of the model.

  • Further training is needed for different data types.

What performance metrics were used to affirm the model's performance?

  • F1

What are the potential known risks to users and stakeholders?

  • N/A

What training is recommended for developers working with this model?

  • None

Link the relevant end user license agreement

Model Card ++ Saftey & Security Subcard

Link the location of the training dataset's repository.

Is the model used in an application with physical safety impact?

  • No

Describe physical safety impact (if present).

  • N/A

Was model and dataset assessed for vulnerability for potential form of attack?

  • No

Name applications for the model.

  • Industrial Control System (ICS) Cyber Attack Detection

Name use case restrictions for the model.

  • Different models need to be trained for different types of data

Has this been verified to have met prescribed quality standards?

  • No

Name target quality Key Performance Indicators (KPIs) for which this has been tested.

  • N/A

Technical robustness and model security validated?

  • No

Is the model and dataset compliant with National Classification Management Society (NCMS)?

  • No

Are there explicit model and dataset restrictions?

  • No

Are there access restrictions to systems, model, and data?

  • No

Is there a digital signature?

  • No

Model Card ++ Privacy Subcard

Generatable or reverse engineerable personally-identifiable information (PII)?

  • Neither

Was consent obtained for any PII used?

  • N/A

Protected classes used to create this model? (The following were used in model the model's training:)

  • N/A

How often is dataset reviewed?

  • Unknown

Is a mechanism in place to honor data subject right of access or deletion of personal data?

  • N/A

If PII collected for the development of this AI model, was it minimized to only what was required?

  • N/A

Is data in dataset traceable?

  • N/A

Scanned for malware?

  • No

Are we able to identify and trace source of dataset?

  • Yes

Does data labeling (annotation, metadata) comply with privacy laws?

  • N/A

Is data compliant with data subject requests for data correction or removal, if such a request was made?

  • N/A