SlideShare a Scribd company logo
Improving IV&V Techniques
Through the Analysis of Anomalies

           Tim Menzies (Ph.D.)
           assoc. prof., LCSEE
           http://menzies.us
           http://menzies.us/pdf/sas07brief.pdf
           8/31/07
Problem
          Flying Safely to 2020 and beyond means attacking
          relentlessly all three levels of the risk iceberg!

          - Brian O’Connor March 20, 2003




                                                    But how to
                                                   know what we
                                                    don’t know?




                   SAS_07_Anomalies_Menzies: page 2 of 9
Approach




   SAS_07_Anomalies_Menzies: page 3 of 9
Approach (details):                             An incremental
                                                discretizer + a Bayes
count, alert, fix                               classifier where all inputs
                                                are all mono-classified
                                                Track average max
                                                likelihood for data
                                                processing in “era”’s of X
                                                instances
               Count: stuff seen in past
               Alert: if new counts different   Contrast set learning
               Fix: find delta new to old       Linear time inference,
                      Very, very fast           Tiny memory footprint




                  And, it works [Orrego, 2004]
                   – F15 simulator data [courtesy B. Cukic]
                   – Five flights: a,b,c,d,e
                   – each with different off-nominal condition
                     imposed at “time” 15
                   – Off-nominal condition not present in prior data
                   – In all cases,
                     massive change detected


                     SAS_07_Anomalies_Menzies: page 4 of 9
Relevance to NASA
Recent examples of ignored anomalies

Challenger launch decision




                              SAS_07_Anomalies_Menzies: page 5 of 9
Relevance to NASA (2)
More examples of ignored anomalies

Columbia ice strike:
 – Size: 1200 in3,
 – Speed: 477 mph
   (relative to vehicle)

Certified as “safe” by the
CRATER micro-meteorite
model
 – A typical experiment in
   CRATER!s test database
      • Size: 3 in3 piece of debris
      • Speed: under 150 mph.


                                      SAS_07_Anomalies_Menzies: page 6 of 9
Relevance to NASA (3)
Fast-time vs slow-time monitoring + repair

Fast time (milliseconds):
 – A generic IVHM, optimized
   for speed + memory.
 – On-board real-time advisor
    for ground control, crew
      • Explored elsewhere

Slow time (days to months):
 – Monitoring software projects
 – E.g. IV&V’s thin pipe of data
   to the project
      • Is anything going on in the project
        that they haven’t told us yet?


                                         SAS_07_Anomalies_Menzies: page 7 of 9
Accomplishments
Core algorithms                                    Good news:
 –   Much progress (good geek stuff)                –   there exists at least 5 NASA data
                                                        sources with strong quality
                                                        indicators
Fast-time:
                                                   Bad news:
 –   ? Install into JSC’s TRICK system
                                                    –    4 / 5 are now inactive
 –   Distribute an intelligent advisor with
     that simulator                                 –   Even those some of that data would
                                                        be simple, cheap, t collect across
 –   Explored elsewhere
                                                        the NASA enterprise
                                                    –   Q: why does NASA ignore valuable
Slow-time:
                                                        data sources about NASA software?
 –   To find anomalies in project data…
                                                    –   A: ?
 –   … we need to find project data.
                                                   Good news:
 –   This afternoon: We have good
                                                    –   1 / 5 still active
     news and we have bad news
                                                    –   Can build the anomaly detectors for
                                                        NASA projects



                                              SAS_07_Anomalies_Menzies: page 8 of 9
Next Steps
Two application areas:
– Fast time: TRICK / JSC
– Slow time:IV&V project monitoring
To do
– Hook algorithms into active data sources
– Assess if we can detect anomalies
– Assess if we can propose repairs


                    SAS_07_Anomalies_Menzies: page 9 of 9

More Related Content

Similar to Sas 07 Anomalies

資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
bv8af4
 
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
eswcsummerschool
 
Ruby, rails, no sql and big data
Ruby, rails, no sql and big dataRuby, rails, no sql and big data
Ruby, rails, no sql and big data
John Repko
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 

Similar to Sas 07 Anomalies (20)

資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
 
Disk Failures
Disk FailuresDisk Failures
Disk Failures
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
The Sanger Mouse Resources Portal - A Testbed for Collaborative Data Integration
The Sanger Mouse Resources Portal - A Testbed for Collaborative Data IntegrationThe Sanger Mouse Resources Portal - A Testbed for Collaborative Data Integration
The Sanger Mouse Resources Portal - A Testbed for Collaborative Data Integration
 
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
ESWC SS 2013 - Wednesday Tutorial Marko Grobelnik: Introduction to Big Data A...
 
Os Django
Os DjangoOs Django
Os Django
 
Ruby, rails, no sql and big data
Ruby, rails, no sql and big dataRuby, rails, no sql and big data
Ruby, rails, no sql and big data
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
 
Database Development Mistakes
Database Development MistakesDatabase Development Mistakes
Database Development Mistakes
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
PyData 2015 Keynote: "A Systems View of Machine Learning"
PyData 2015 Keynote: "A Systems View of Machine Learning" PyData 2015 Keynote: "A Systems View of Machine Learning"
PyData 2015 Keynote: "A Systems View of Machine Learning"
 
Power Point Kills
Power Point KillsPower Point Kills
Power Point Kills
 
Power Point Kills - narrated
Power Point Kills - narratedPower Point Kills - narrated
Power Point Kills - narrated
 
2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA
 
Synergy of Human and Artificial Intelligence in Software Engineering
Synergy of Human and Artificial Intelligence in Software EngineeringSynergy of Human and Artificial Intelligence in Software Engineering
Synergy of Human and Artificial Intelligence in Software Engineering
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...
 
Scaling Deep Learning Algorithms on Extreme Scale Architectures
Scaling Deep Learning Algorithms on Extreme Scale ArchitecturesScaling Deep Learning Algorithms on Extreme Scale Architectures
Scaling Deep Learning Algorithms on Extreme Scale Architectures
 
Cloud Resilience with Open Stack
Cloud Resilience with Open StackCloud Resilience with Open Stack
Cloud Resilience with Open Stack
 
Internet World Web2
Internet World Web2Internet World Web2
Internet World Web2
 
Creating Practical Security Test-Cases for Web Applications
Creating Practical Security Test-Cases for Web ApplicationsCreating Practical Security Test-Cases for Web Applications
Creating Practical Security Test-Cases for Web Applications
 

More from CS, NcState

Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9
CS, NcState
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
CS, NcState
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
CS, NcState
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
CS, NcState
 

More from CS, NcState (20)

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdec
 
Future se oct15
Future se oct15Future se oct15
Future se oct15
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest link
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software Engineering
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
 
Goldrush
GoldrushGoldrush
Goldrush
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
 
Know thy tools
Know thy toolsKnow thy tools
Know thy tools
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Sas 07 Anomalies

  • 1. Improving IV&V Techniques Through the Analysis of Anomalies Tim Menzies (Ph.D.) assoc. prof., LCSEE http://menzies.us http://menzies.us/pdf/sas07brief.pdf 8/31/07
  • 2. Problem Flying Safely to 2020 and beyond means attacking relentlessly all three levels of the risk iceberg! - Brian O’Connor March 20, 2003 But how to know what we don’t know? SAS_07_Anomalies_Menzies: page 2 of 9
  • 3. Approach SAS_07_Anomalies_Menzies: page 3 of 9
  • 4. Approach (details): An incremental discretizer + a Bayes count, alert, fix classifier where all inputs are all mono-classified Track average max likelihood for data processing in “era”’s of X instances Count: stuff seen in past Alert: if new counts different Contrast set learning Fix: find delta new to old Linear time inference, Very, very fast Tiny memory footprint And, it works [Orrego, 2004] – F15 simulator data [courtesy B. Cukic] – Five flights: a,b,c,d,e – each with different off-nominal condition imposed at “time” 15 – Off-nominal condition not present in prior data – In all cases, massive change detected SAS_07_Anomalies_Menzies: page 4 of 9
  • 5. Relevance to NASA Recent examples of ignored anomalies Challenger launch decision SAS_07_Anomalies_Menzies: page 5 of 9
  • 6. Relevance to NASA (2) More examples of ignored anomalies Columbia ice strike: – Size: 1200 in3, – Speed: 477 mph (relative to vehicle) Certified as “safe” by the CRATER micro-meteorite model – A typical experiment in CRATER!s test database • Size: 3 in3 piece of debris • Speed: under 150 mph. SAS_07_Anomalies_Menzies: page 6 of 9
  • 7. Relevance to NASA (3) Fast-time vs slow-time monitoring + repair Fast time (milliseconds): – A generic IVHM, optimized for speed + memory. – On-board real-time advisor for ground control, crew • Explored elsewhere Slow time (days to months): – Monitoring software projects – E.g. IV&V’s thin pipe of data to the project • Is anything going on in the project that they haven’t told us yet? SAS_07_Anomalies_Menzies: page 7 of 9
  • 8. Accomplishments Core algorithms Good news: – Much progress (good geek stuff) – there exists at least 5 NASA data sources with strong quality indicators Fast-time: Bad news: – ? Install into JSC’s TRICK system – 4 / 5 are now inactive – Distribute an intelligent advisor with that simulator – Even those some of that data would be simple, cheap, t collect across – Explored elsewhere the NASA enterprise – Q: why does NASA ignore valuable Slow-time: data sources about NASA software? – To find anomalies in project data… – A: ? – … we need to find project data. Good news: – This afternoon: We have good – 1 / 5 still active news and we have bad news – Can build the anomaly detectors for NASA projects SAS_07_Anomalies_Menzies: page 8 of 9
  • 9. Next Steps Two application areas: – Fast time: TRICK / JSC – Slow time:IV&V project monitoring To do – Hook algorithms into active data sources – Assess if we can detect anomalies – Assess if we can propose repairs SAS_07_Anomalies_Menzies: page 9 of 9