Managing Complex Network Operation with Predictive Analytics



Similar documents
Managing Complex Network Operation with Predictive Analytics

Consumption of OData Services of Open Items Analytics Dashboard using SAP Predictive Analysis

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Client Overview. Engagement Situation. Key Requirements

Securely Connect, Network, Access, and Visualize Your Data

Towards Smart and Intelligent SDN Controller

Preparing for Distributed Energy Resources

Understanding SCADA System Security Vulnerabilities

Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security

A Biologically Inspired Approach to Network Vulnerability Identification

IEEE-Northwest Energy Systems Symposium (NWESS)

Integrated System Modeling for Handling Big Data in Electric Utility Systems

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

Cisco Data Preparation

How To Create An Insight Analysis For Cyber Security

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Interactive information visualization in a conference location

Elsa C. Augustenborg Gary R. Danielson Andrew E. Beck

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Advanced Distribution Management System: Field Client

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Effective Methods to Detect Current Security Threats

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining

NStreamAware: Real-Time Visual Analytics for Data Streams to Enhance Situational Awareness

A Network Management Framework for Emerging Telecommunications Network.

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

The Cloud Balancing Act for IT: Between Promise and Peril

Electric Energy Systems

The demonstration will be performed in the INTA high speed ring to emulate highway geometry and driving conditions.

The Cyber Threat Profiler

Radiological Assessment Display and Control System

Fighting Advanced Threats

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Situational Awareness Through Network Visualization

CYBERSPACE SECURITY CONTINUUM

Best Practices for Creating Your Smart Grid Network Model. By John Dirkman, P.E.

Protecting Organizations from Cyber Attack

Flood Modelling for Cities using Cloud Computing FINAL REPORT. Vassilis Glenis, Vedrana Kutija, Stephen McGough, Simon Woodman, Chris Kilsby

Cyber Security Risk Management

Recommending News Articles using Cosine Similarity Function Rajendra LVN 1, Qing Wang 2 and John Dilip Raj 1

Attack Intelligence: Why It Matters

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

NGNP Risk Management Database: A Model for Managing Risk

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

Grid Density Clustering Algorithm

Lambda Architecture. Near Real-Time Big Data Analytics Using Hadoop. January Website:

Credit Card Fraud Detection Using Self Organised Map

A stream computing approach towards scalable NLP

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities

Application of SAS! Enterprise Miner in Credit Risk Analytics. Presented by Minakshi Srivastava, VP, Bank of America

COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN

Risk-Based IT Change Management

UPS battery remote monitoring system in cloud computing

Data Validation Online References

Safeguards and Security

GIS Tutorial for Marketing. Managing Sales Territories

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Data Exploration Data Visualization

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Infrastructure Interdependencies

Intelligent. Buildings: Understanding and managing the security risks

FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

A Framework for End-to-End Proactive Network Management

Microsoft Business Intelligence Visualization Comparisons by Tool

Effective Methods to Detect Current Security Threats

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Cyber Security R&D (NE-1) and (NEET-4)

Visualization with Excel Tools and Microsoft Azure

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

COM CO P 5318 Da t Da a t Explora Explor t a ion and Analysis y Chapte Chapt r e 3

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Testimony of Patrick D. Gallagher, Ph.D. Deputy Director

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Addressing Dynamic Threats to the Electric Power Grid Through Resilience

Transcription:

PNNL-SA-65448 AAAI 009 Spring Symposium Series Technosocial Predictive Analytics Managing Complex Network Operation with Predictive Analytics Z. Henry Huang Pak Chung Wong Patrick Mackey Yousu Chen Jian Ma Kevin Schneider Frank L. Greitzer Pacific Northwest National Laboratory March 009

Presentation Outline Background on Complex Networks and Complex Network Operation Predictive Analytics for Decision Support Visual Analytics for Risk Assessment Visual Trending Analysis Clustering Analysis Conclusion and Future Work

Background Complex Networks General Features Complex structure Wide geographical coverage Large volume of data Complex data/it support systems Critical role of human operators Source: Time Warner Telecom Source: US Airways

Background Complexity of Network Operations Physical Attacks Human Errors Ice & Lightening Storms Dig-Ins Cyber Attacks Map Source: Time Warner Telecom Vehicular Collisions

Background Inadequacy in Network Operations Today s Network Operation Tools Mainly experience-based Raw/Tabular presentation dominates Overwhelmed operators No support for real-time situational awareness and decision making Technical gap between data and actionable information Tabular raw presentation of violations without processing

Need for Predictive Analytics for Decision Support Decision Support with Predictive Analytics for Command and Control of Complex Networks Is the network becoming compromised? Recognize developing problems What would the problem cause to the network? Predict consequences of failures How effective would our response be to the problem? Evaluate potential remedial actions Enabling predictive complex network operations

. Visual Analytics for Risk Assessment () Risk Index Based on Network Stress Node index R% = node stress level Link index R% = link stress level Multi-Layer Risk Index Superimpose risk indices for multiple possible configurations R% = max(r% i ) Superimpose

. Visual Analytics for Risk Assessment () Visual Representation of Risk Indices Based on HaveGreen in C#, using Managed DirectX Gaussian color mapping with green/gray/red scale 00 layers of possible futures in the western power grid

. Visual Analytics for Risk Assessment () Statistical Analysis for Deriving Network Risk Indices System Risk Index Regional Risk Index Arithmetic Average Risk Index η = γ i R% n Geometric Average Risk Index Risk Index: [ ( )] ni R% = i ni i i i n R % = aη + aγ i i i

. Visual Analytics for Risk Assessment (4) Time Series Analysis Scenario: western power grid with increasing stress and lost element 6 Stress Level 8 4 0 Lost a large nuclear power plant 7:00 7:0 8:00 8:0 9:00 Time (hour)

. Visual Trending Analysis () Statistical Analysis to Identify Security Trend Increase in risk index (i.e. size and color intensity) indicates imminent problems System trend Regional trend R% R% R% Trending Past Now Future Time

. Visual Trending Analysis () Automatic Recognition of Merging and Separation of Security Regions Complex trend evolving patterns 4 Merging/ Splitting 4 Merging Stealing 4 4 4 Splitting Stealing/ Splitting 4 4 5

. Visual Trending Analysis () Combination of Structural Analysis and Statistical Analysis via Relation Matrix Statistical analysis for risk indices of individual regions Structural analysis to identify evolving patterns R 0 0 40 R R 0 40 Evolve

. Visual Trending Analysis (4) Case Studies western US power grid System trending System trend Lost a large nuclear power plant Trending

. Visual Trending Analysis (5) Case Studies western US power grid Regional trending Regional trend Lost a large nuclear power plant Trending

. Visual Trending Analysis (6) Case Studies western US power grid Regional evolving patterns

. Clustering Analysis Identify relationship between configurations and affected assets Enable operators to focus on important information Affected Assets Pattern Configurations

Conclusion and Future Work () Predictive analytics can play a key role in complex network operations Color contoured map representation of large amount of operation data for improved situational awareness Predictive capability by analyzing the trend of the visual representation Converting large amounts of operation data into actionable information Actual models and data of the western North American power grid demonstrate the validity of the predictive analytics.

Conclusion and Future Work () Future Work Probability Analysis for Multiple Predictions Enable the management of multiple possible futures Interactive Evaluation of Remedial Actions Provide guidance for preventing and mitigating failures Prediction 0% 0% 50% past now future Time Operator Actions: reconfiguration, re-dispatch, load shedding,

Questions?