skip to main content
10.1145/3412841.3442074acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Understanding the properness of incorporating machine learning algorithms in safety-critical systems

Published: 22 April 2021 Publication History

Abstract

Nowadays, Machine Learning (ML) algorithms are being incorporated into many systems since they can learn and solve complex problems. Some of these systems can be considered as Safety-Critical Systems (SCS), therefore, the performance of ML algorithms should be sufficiently safe concerning the safety requirements of the incorporating SCS. However, the performance analysis of ML algorithms, usually, relies on metrics that were not developed with safety in mind. Accordingly, they may not be appropriate for assessing the performance of ML algorithms concerning safety. This paper debates on accounting for the distribution - not just the amount - of False Negatives as an additional element to be used when assessing ML algorithms to be integrated into SCS. We empirically try to assess the properness of incorporating ML-based components (anomaly-based intrusion detectors) into SCS using both traditional and novel SSPr and NPr metrics that focus on the numbers as well as the distribution of False Negatives. Results obtained by our experiment allow discussing the potential of ML-based components to be incorporated into SCS.

References

[1]
Marco Bozzano and Adolfo Villafiorita. 2010. Design and Safety Assessment of Critical Systems. Auerbach Publications.
[2]
Filipe Falcão, Anderson Santos, Tommaso Zoppi, Baldoino Fonseca, Andrea Bondavalli, Caio Barbosa Viera Silva, and Andrea Ceccarelli. 2019. Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection. Proceedings of the ACM Symposium on Applied Computing Part F1477 (2019), 318--327.
[3]
Mohamad Gharib and Andrea Bondavalli. 2019. On the Evaluation Measures for Machine Learning Algorithms for Safety-Critical Systems. In 15th European Dependable Computing Conference (EDCC). IEEE, 141--144. https://ieeexplore.ieee.org/abstract/document/8893310/
[4]
IEC. 2000. IEC 61508: Functional safety of electrical/electronic/programmable electronic safety-related systems. IEC, Geneva, Switzerland (2000).
[5]
Nour Moustafa and Jill Slay. 2015. UNSW-NB15: A comprehensive data set for network intrusion detection systems. In Military Communications and Information Systems Conference, 2015. 1--6.
[6]
David Martin Powers. 2011. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. Journal of Machine Learning Technologies 2, 1 (2011), 37--63.
[7]
Saharon Rosset and Aron Inger. 2000. KDD-cup 99: Knowledge Discovery In a Charitable Organization's Donor Database. Technical Report 2. 85--90 pages.
[8]
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A. Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers and Security 31, 3, 2012, 357--374.
[9]
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set.
[10]
Tommaso Zoppi, Andrea Ceccarelli, and Andrea Bondavalli. 2019. Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD. In Proceedings - International Symposium on Software Reliability Engineering, ISSRE, Vol. 2019-Octob. 446--455.
[11]
Tommaso Zoppi, Andrea Ceccarelli, and Andrea Bondavalli. 2019. MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems. IEEE Transactions on Dependable and Secure Computing (2019).

Cited By

View all

Index Terms

  1. Understanding the properness of incorporating machine learning algorithms in safety-critical systems

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing
          March 2021
          2075 pages
          ISBN:9781450381048
          DOI:10.1145/3412841
          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 22 April 2021

          Check for updates

          Author Tags

          1. algorithms
          2. machine learning
          3. performance metrics
          4. safety measures
          5. safety-critical systems

          Qualifiers

          • Poster

          Funding Sources

          • The European Union?s Horizon 2020 research and innovation program under the Marie Sklodowska- Curie grant agreement

          Conference

          SAC '21
          Sponsor:
          SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing
          March 22 - 26, 2021
          Virtual Event, Republic of Korea

          Acceptance Rates

          Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

          Upcoming Conference

          SAC '25
          The 40th ACM/SIGAPP Symposium on Applied Computing
          March 31 - April 4, 2025
          Catania , Italy

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)9
          • Downloads (Last 6 weeks)2
          Reflects downloads up to 24 Dec 2024

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media