diff --git a/trust/images/a1.svg b/trust/images/a1.svg new file mode 100644 index 0000000..5d2acd0 --- /dev/null +++ b/trust/images/a1.svg @@ -0,0 +1,776 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + Trace + + + + + + + + Patterns + + + + + + + + State Labels + + + + + + + Policies + + + + P1 + P2 + P3 + + + + + + + + + + + + + + + + Policy Checker + Activity Detector + + Array of Ternary Labels + + + + + + + + + + + 1 + 1 + 1 + 1 + 0 + 0 + -1 + -1 + A + A + B + C + X + X + B + A + + + + + + + + Trust Model + + Input + + + diff --git a/trust/images/a2.svg b/trust/images/a2.svg new file mode 100644 index 0000000..5a13b0e --- /dev/null +++ b/trust/images/a2.svg @@ -0,0 +1,586 @@ + + + + + + + + + + + + + + + + + + + + + Trace + + + + + + + + Patterns + + + + + + + + State Labels + + + + + + + Specific Pattern + + + + + + + + + + + + + + + + Decision + Activity Detector + Single Ternary Label + + + + + + + A + A + B + C + X + X + B + A + + + + + + + + Trust Model + + Input + + 1 | 0 | -1 + + diff --git a/trust/overview.ty b/trust/overview.ty new file mode 100644 index 0000000..79d79f0 --- /dev/null +++ b/trust/overview.ty @@ -0,0 +1,27 @@ += Approaches for System Condition Evaluation + +The physics-based activity detection system select a label for each measurement in the time series. +From this array of labels, there are multiple approaches to evaluate if the system is performing as expected or not. +Each approach result in a different intermediate data format (from the detection system to the trust model) and represent a different interpretation of the detection. +Selecting one approache is a core design choice for the complete system. + +Both approaches are simmilar and each could be expressed with the other. +However they differ in the format of the output. +This outputformat may influence how the trust model ingest the new results and how the time series are submitted for state detection. +== Approach 1. Compliance to Security Policies + +#figure(image("images/a1.svg", width:100%),caption: "Data pipeline of the first approache.") + +With the security policy approach, each power measurement receives a label corresponding to the compliance of the system to pre-defined security policies. +The label is ternary with +- 1 = Policies Respected +- 0 = Not all Policies Respected +- -1 = Unsure + +== Approach 2. Presence of Specific Patterns + +#figure(image("images/a2.svg", width:100%),caption: "Data pipeline of the second approache.") + +The second approach generates a single label for a complete time series based on the presence of a specific pattern. +The selected pattern could be representative of a known anomalous state. +This approache is similar to the first one as it also look for a state in the time serie (the presence of the pattern could be described as a security policy) but differs by the decision algorithm that could take into account large portions of unknown to decide on an unknown output (-1).