Every aspect of our daily life is going to be permeated by the Artificial Intelligence. The amount and complexity of data collected required an artificial intelligence system able to work at a non-human scale to support human tasks. Because these systems still need the human interpretation, their translation into a human-scale knowledge is fundamental.
Design is charged to integrate the machine system with the human thinking, opening new access to knowledge.
Project Area
Water distribution systems are undergoing a process of intensive digitalization, adopting network devices (smart sensors, industrial computers, telemetry units) for monitoring and control. While this transition improves efficiency and reliability, these infrastructures are increasingly exposed to cyber-attacks. Cyber-attacks engender anomalous system behaviours which can be detected by data-driven algorithms monitoring sensors readings to disclose the presence of potential threats [A].
Cyber-attacks are usually perpetrated to sabotage the function of the system, causing damages or compromising the water quality. The attacks can be also focused on data spying, with the intention to steal information or organize future alterations. These kinds of attacks could be executed on government or private structure, both effecting public security. The Institutions tend to avoid communicating the events to protect data and details of the reported cases, but some response dedicated teams have been created to prevent and limit the consequences.
Kinds of Anomalies
Different kinds of anomalies can occur to the system, depending on the components involved and the action perpetrated to provoke them. The process of monitoring is composed by two levels: the first one focuses on the water quality, while the second one monitors the quantity.
The project is focused on the quantity level, which looks at the data coming from the sensors of the network components. The irregularities registered on this data could damage the physical components or the informatics devices. In both cases, the irregularities could accidentally happen, for a breakdown, or could be done on purpose, in case of attack.
The algorithm of the project specifically works detecting the anomalies caused by the attacks perpetrated on components and sensors, recognizing their specific behaviour.
Image source: [B]
Water Network Distribution System
The Water Supply System is composed by the pipes and the devices distributed in the urban territory and able to bring the water supply to private and public systems.
The components will be considered during the project are the following: Sensor devices are assembled on each of these elements to allow the data gathering.
To transmit and manage these information other components are needed: For every network component, a sensor transmits the data to the Central System (SCADA), where analysts can monitor the system status.
Kinds of Attacks
The kind of attack is defined by the feature of the components involved. In the study [A] they are thoroughly presented.
Here a sum of the typologies is listed: The attack to the SCADA system is not considered in the study because, if the SCADA has been compromised, the anomalies could not be detected: the system configuration is changed by the attacker controlling all the operations.
User: The Analyst
The analyst who controls and monitors the data and guide the operation in case of anomalies has been identified as user of the sonification we designed. He is a technician involved in the network supervision. He has usually studied process, chemical or mechanical engineering, sometimes he is a civil engineer with a lot of years of experience. He has not the mathematical competence to understand the algorithm. He spends his day analysing data coming from the sensor, comparing them with the data of the previous days, looking for patterns and anomalous behaviours.
Analysts work from the operation room where there are usually 10 monitors to show different information coming from the system. The work shifts usually involve two workers per time (where the system monitored has the medium-large dimension, like the one we worked on).
Image source
What happen in case of Anomaly
The current anomaly detection system does not distinguish between anomalies caused by disruption and anomalies caused by attacks. The interface is composed by a general map where the network elements are not necessary disposed in a geographic order and by different visualizations the analysts can choose to control the status of a specific component in a specific time range.
The symbol representing the component changes its colour when interested by an anomaly; a pop-up message appears on the screen to call the attention of the operator, who can open different windows selecting the part he is interested in. He is in the habit to compare the parameter with the value of the component related to the one which is not working well and, he also checks the value evolution during the time, trying to understand the problem causing the anomaly. Confident in his experience, he expresses a hypothesis and asks the technician to solve the problem operating on place.
Problems Identified
The analysis of the current situation reveals the main problems the identification of drove the role of the sound during the project.