Skip to main content

Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components

  • Chapter
  • First Online:
Artificial Intelligence and Cybersecurity

Abstract

Critical system resilience is a focus point in risk management due to the severe consequences of system failure. As such critical systems become increasingly cyber-physical, cybersecurity vulnerabilities also play a more significant role in system analysis. Now, as the world turns to Artificial Intelligence (AI)-based solutions, the novel vulnerabilities in AI and other black box components add a complexity dimension to the assessment of cyber-physical critical system analysis. This chapter provides a closer look at a Model Based Systems Engineering (MBSE) approach to assess and design the resilience of complex systems throughout their life cycle. As a case study of a system of systems comprised of Unmanned Aerial Systems (UASs) and Unmanned Surface Vessels (USVs) for littoral zone patrol is presented with a focus on system resilience under a national security mission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Basu, K., Saeed, S.M., Pilato, C., Ashraf, M., Nabeel, M.T., Chakrabarty, K., Karri, R.: Cad-base: An attack vector into the electronics supply chain. ACM Trans. Design Autom. Electron Syst. 24(4), 1–30 (2019)

    Article  Google Scholar 

  2. Bickford, J., Van Bossuyt, D.L., Beery, P., Pollman, A.: Operationalizing digital twins through model-based systems engineering methods. Syst. Eng. 23(6), 724–750 (2020)

    Article  Google Scholar 

  3. Brown, T.B., Mané, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch (2018)

    Google Scholar 

  4. Buchanan, B.G.: A (very) brief history of artificial intelligence. Ai Mag. 26(4), 53–53 (2005)

    Google Scholar 

  5. Datta, A., Franklin, J., Garg, D., Jia, L., Kaynar, D.K.: On adversary models and compositional security. IEEE Secur. Privacy 9, 26–32 (2011)

    Article  Google Scholar 

  6. Davies, R.: Industry 4.0: Digitalisation for productivity and growth. Briefing PE 568.337, European Parliamentary Research Service (2015)

    Google Scholar 

  7. Fingas, J.: Hackers conduct one of the largest supply chain cyberattacks to date: a breach at Kaseya has affected over 200 companies. Engadget (2021). https://www.engadget.com/kaseya-ransomware-cyberattack-155719139.html

  8. Goebel, R., Chander, A., Holzinger, K., Lecue, F., Akata, Z., Stumpf, S., Kieseberg, P., Holzinger, A.: Explainable ai: the new 42? In: International Cross-Domain Conference for Machine Learning and Knowledge Extraction, pp. 295–303. Springer, Berlin (2018)

    Google Scholar 

  9. Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2015). CoRR abs/1412.6572

    Google Scholar 

  10. Gran, B.A., Fredriksen, R., Thunem, A.P.J.: An approach for model-based risk assessment. In: International Conference on Computer Safety, Reliability, and Security, pp. 311–324. Springer, Berlin (2004)

    Google Scholar 

  11. Hale, B., Van Bossuyt, D.L., Papakonstantinou, N., O’Halloran, B.: A zero-trust methodology for security of complex systems with machine learning components. In: International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers (2021)

    Google Scholar 

  12. Kavak, H., Padilla, J.J., Vernon-Bido, D., Diallo, S.Y., Gore, R., Shetty, S.: Simulation for cybersecurity: state of the art and future directions. J. Cybersecur. 7, tyab005 (2021)

    Google Scholar 

  13. Kovacs, E.: Tesla car hacked remotely from drone via zero-click exploit. Security Week (2020). https://www.securityweek.com/tesla-car-hacked-remotely-drone-zero-click-exploit

  14. Liu, Y., Mondal, A., Chakraborty, A., Zuzak, M., Jacobsen, N., Xing, D., Srivastava, A.: A survey on neural trojans. In: 2020 21st International Symposium on Quality Electronic Design (ISQED), pp. 33–39 (2020)

    Google Scholar 

  15. MarketsandMarkets Research Staff: Artificial intelligence market by offering (hardware, software, services), technology (machine learning, natural language processing), deployment mode, organization size, business function (law, security), vertical, and region—global forecast to 2026. Tech. rep., MarketsandMarkets (2021). https://www.marketsandmarkets.com/Market-Reports/artificial-intelligence-market-74851580.html

  16. Mili, S., Nguyen, N., Chelouah, R.: Model-driven architecture based security analysis. Systems Engineering (2021)

    Google Scholar 

  17. Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS) (2005). http://d-scholarship.pitt.edu/16516/

  18. Object Management Group Inc.: Welcome to UML Web Site! Accessed 12 Aug 2021. https://www.uml.org/

  19. Papakonstantinou, N., Hale, B., Linnosmaa, J., Salonen, J., Van Bossuyt, D.L.: Model driven engineering for resilience of systems with black box and ai-based components. In: Annual Reliability and Maintainability Symposium (RAMS). IEEE, Piscataway (2022)

    Google Scholar 

  20. Papakonstantinou, N., Van Bossuyt, D.L., Linnosmaa, J., Hale, B., O’Halloran, B.: A zero trust hybrid security and safety risk analysis method. J. Comput. Inform. Sci. Eng. 21(5), 050907 (2021)

    Article  Google Scholar 

  21. Pidd, M.: Systems Modelling: Theory and Practice. Wiley, New York (2004)

    MATH  Google Scholar 

  22. Ruegamer, A., Kowalewski, D., et al.: Jamming and spoofing of GNSS signals–an underestimated risk?! Proc. Wisdom Ages Challenges Modern World 3, 17–21 (2015)

    Google Scholar 

  23. Russell, S.J., Stuart, J.: Norvig. Artificial Intelligence: A Modern Approach, pp. 111–114 (2003)

    Google Scholar 

  24. Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 210–229 (1959)

    Article  Google Scholar 

  25. Schaeffer, J.: Didn’t Samuel solve that game? In: One Jump Ahead, pp. 1–11. Springer, Berlin (2009)

    Google Scholar 

  26. Shane, S., Sanger, D.E.: Drone Crash in Iran Reveals Secret Us Surveillance Effort. The New York Times, vol. 7 (2011)

    Google Scholar 

  27. Stamatelatos, M., Dezfuli, H., Apostolakis, G., Everline, C., Guarro, S., Mathias, D., Mosleh, A., Paulos, T., Riha, D., Smith, C., et al.: Probabilistic risk assessment procedures guide for NASA managers and practitioners. Tech. rep., National Air and Space Administration (2011)

    Google Scholar 

  28. SysML.Org: SysML Open Source Project—What is SysML? Who created SysML? Accessed 12 Aug 2021. https://sysml.org/

  29. Systems Engineering Research Consortium: Model based systems engineering (mbse) (2020). https://www.nasa.gov/consortium/ModelBasedSystems

  30. Tao, F., Zhang, H., Liu, A., Nee, A.Y.C.: Digital twin in industry: state-of-the-art. IEEE Trans. Ind. Inform. 15(4), 2405–2415 (2019). https://doi.org/10.1109/TII.2018.2873186

    Article  Google Scholar 

  31. US Nuclear Regulatory Commission: Probabilistic risk assessment (pra) (2020). https://www.nrc.gov/about-nrc/regulatory/risk-informed/pra.html

  32. Xiang, Z., Miller, D.J., Kesidis, G.: A benchmark study of backdoor data poisoning defenses for deep neural network classifiers and A novel defense. In: 29th IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2019, Pittsburgh, PA, USA, October 13–16, 2019, pp. 1–6. IEEE, Piscataway (2019)

    Google Scholar 

  33. Yamin, M.M., Ullah, M., Ullah, H., Katt, B.: Weaponized ai for cyber attacks. J. Inform. Secur. Appl. 57, 102722 (2021). https://doi.org/10.1016/j.jisa.2020.102722

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Douglas L. Van Bossuyt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Van Bossuyt, D.L., Papakonstantinou, N., Hale, B., Salonen, J., O’Halloran, B. (2023). Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components. In: Sipola, T., Kokkonen, T., Karjalainen, M. (eds) Artificial Intelligence and Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-15030-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15030-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15029-6

  • Online ISBN: 978-3-031-15030-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics