A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

Size: px
Start display at page:

Download "A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees"

Transcription

1 1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project

2 2 / 35 Plan Introduction 1 Introduction Cyber attacks nowadays Graphical security models Quantitative analysis of security models 2 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics

3 Cyber attacks nowadays Cyber attacks nowadays Graphical security models Quantitative analysis of security models Cyber attacks are becoming more and more: Complex, Organized, Distributed and Sophisticated. Their impact therefore is sometimes weighty, in some cases not tolerable. 3 / 35

4 Graphical security models Cyber attacks nowadays Graphical security models Quantitative analysis of security models To fend of cyber attacks negative impact, research efforts have come with the development and design of security models: 4 / 35

5 Graphical security models Cyber attacks nowadays Graphical security models Quantitative analysis of security models Attack trees: A tree-based model for cyber attacks representation. Introduced by Schneier in Attack graphs: A directed graph-based model for cyber attacks representation. Attack countermeasures trees: A tree-based model to graphically represent attacks and defenses in the same layout. Attack-defense trees: Extend the attack tree model with refinable countermeasures. Introduced by Kordy et al. in / 35

6 Cyber attacks nowadays Graphical security models Quantitative analysis of security models Quantitative analysis of security models - How? Quantitative analysis is performed either by the use of analytical approach relying on Baysian Networks, Petri Nets, Markov chains or simulations such as Discrete simulation, Monte Carlo simulation. - By? Computing metrics or attributes like : Probability of an attack or a scenario in a given time, cost of the attacks, efficiency of countermeasures, mean time to breach a system, the most probable scenario,... - Why? Perform quantitative analysis which will help to reduce the risk and the negative impact of cyber attacks. 6 / 35

7 7 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics - What is it? Graphical methodology. - Used for? Security scenario representation. - Ancestor? Attack Trees. - Interpretation: Can be seen as game between two players (proponent vs opponent). - Semantics: Multisets, De Morgan lattice, Equational, Propositional, Series-Parallel graphs. - Practice: Used in industry.

8 8 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Graphically: Compromise Server Prevent target identification Network Scanning Escalate privileges Execute dangerous commands IP address space randomization Mutable network Target Exploitation Password Brute force Frequent patch development Vulnerabilities Scanning Use Vulnerability Exploit Password changing policy

9 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Definition 1 ADTrees are defined by means of an abstract syntax called ADTerms, typed-terms over the signature Σ = (S, F), where : S = {p, o} is the set of types of players. F = {( p k ) k N, ( p k ) k N, ( p k ) k N, ( o k ) k N, ( o k ) k N, ( o k ) k N, c p, c o } B p B o is a set of function symbols. Definition 2 ADTrees are closed-terms over the signature Σ = (S, F), and generated by the following grammar, where b s B and s S: t : b s s (t,..., t) s (t,..., t) s (t,..., t) c s (t, t) 9 / 35

10 10 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Examples of ADTerms : t 0 = b p (Basic event) t 1 = p (b p 0, t 0) (Disjunction refinement) t 2 = p (t 1, b p 1 ) (Conjunction refinement) t 3 = p (t 2, b p 2, bp 3 ) (Sequential Conjunction refinement) t 4 = c p (t 3, b0 o) (Counter-defense)

11 ADTree Quantitative Evaluation ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics The quantitative evaluation of an ADTree consists in assessing a set of attributes like:probability, cost, or time. It is performed through the standard bottom-up procedure. 11 / 35

12 ADTree Quantitative Evaluation ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Standard Bottom-up procedure (ADTool): 12 / 35

13 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics However 1 The bottom-up procedure works only for independent events. 2 So far, there is only one approach [KPS14] 1 for quantitative analysis of ADTree with dependent actions. 3 Only discrete analysis can be done. 1. B. Kordy, M. Pouly, and P. Schweitzer. A probabilistic framework for security scenarios with dependent actions. In International Conference on Integrated Formal Methods, , / 35

14 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics We need to develop a new semantics for ADTree. The new semantics should allow dependent events to occur, and provide modeling capabilities for defense in a more realistic way. It should also provide a continuous analysis method for ADTree evaluation. 14 / 35

15 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics We proposed to use : Continuous Time Markov Chain or CTMC as a new semantics for ADTree. We model attacks/defense execution using exponential distribution (good for delayed impact defenses). Using the analytical approach of CTMCs, we can evaluate several attributes, and perform a continuous analysis by the use of Cumulative Distribution Function. 15 / 35

16 Definition 1 A Continuous Time Markov chain is a tuple (S, G, π), where: S is a finite disjoint set of states. G : S S R is the infinitesimal generator matrix which gives the rate of transition between two states s S and s S. π : S [0, 1] is the initial probability distribution on S. λ 1 λ 3 λ 2 16 / 35

17 Definition 2 An explicit continuous time Markov chain M is a tuple (S, S 0, S, G), where: S is a finite disjoint set of states. S 0 S is a finite set of initial states. S S is a finite set of final states. G : S S R is the infinitesimal generator matrix which gives the rate of transition between two states s S and s S. 17 / 35

18 Introduction We have formally defined the semantics of ADTrees in terms of CTMC for each component : Basic events, conjunction refinement, Disjunction refinement, Sequential conjunction refinement, and Countermeasure. 18 / 35

19 Introduction 19 / 35

20 Introduction 20 / 35

21 Introduction 21 / 35

22 Introduction 22 / 35

23 We took an example study: Compromise Server Prevent target identification Network Scanning Escalate privileges Execute dangerous commands IP address space randomization Mutable network Target Exploitation Password Brute force Frequent patch development Vulnerabilities Scanning Use Vulnerability Exploit Password changing policy 23 / 35

24 24 / 35 Introduction We obtain a final CTMC representing the entire ADTree: λ b p 4 λ b p 5 λ b o 2 λ b p 0 λ b o 2 λ p b 3 λ p b 2 λ b o 0 + λ b o 1 λ b p 1 λ p b 1 λ b o 3 λ b o 3 λ b p 2 λ b p 5

25 We have assessed three situational cases: 1 Attack tree (No defense is considered) 2 Adding countermeasure (Prevent target identification) 3 Adding the remaining countermeasures (Password policy, Frequent patches). 25 / 35

26 26 / 35

27 Analytical approach using CTMC is performed as follow: 27 / 35

28 Probabilistic attributes: Probability of final states (black states) representing the final goals G 1 and G 2 Probability G 1 (case 1) G 1 (case 2) G 1 (case 3) G 2 (case 1) G 2 (case 2) G 2 (case 3) Time (Unit) 28 / 35

29 Probabilistic attributes: Probability of final states (black states) representing the final goal G 1 + G 2 Final Goal(case 1) Final Goal(case 2) Final Goal(case 3) Probability Time (Unit) 29 / 35

30 Probabilistic attributes: Expected number of steps for each scenario of G 1 and G 2 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C3 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C2 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C3 [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C2 [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C3 [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C2 [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C / 35

31 Probabilistic attributes: Absorbing probabilities for G 1 and G 2 Probability (%) Case 1 Case 2 Case 3 Absorbing probabilities G 1 G 2 31 / 35

32 Timed attributes: Mean time to security failure 4 Time (Unit) Case 1 Case 2 Case 3 Mean Time To Security Failure 32 / 35

33 Introduction We proposed a new semantics for ADTrees in terms of CTMCs. We applied CTMC to perform quantitative analysis of ADTree with dependent actions. 33 / 35

34 Challenges and Future Work Challenges : Not all attacks and/or countermeasures execution follow exponential-distribution. Estimating the rates for attacks/countermeasures has always been the main challenge for security assessment. Future Work : Extend our framework in order to accurately model social attacks and complex behaviors laying on other distributions. Embed the framework within the ADTool software and make it more adaptable for real life security scenarios. 34 / 35

35 35 / 35 Thanks for your attention Any questions?

Probabilistic Reasoning with Graphical Security Models

Probabilistic Reasoning with Graphical Security Models Probabilistic Reasoning with Graphical Security Models Barbara Kordy a,b,, Marc Pouly c, Patrick Schweitzer b a INSA Rennes, IRISA, France b University of Luxembourg, SnT, Luxembourg c Lucerne University

More information

Probabilistic Assessment of Security Scenarios Challenges and Solutions

Probabilistic Assessment of Security Scenarios Challenges and Solutions Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014 Barbara

More information

Stochastic Petri Net. Ben, Yue (Cindy) 2013/05/08

Stochastic Petri Net. Ben, Yue (Cindy) 2013/05/08 Stochastic Petri Net 2013/05/08 2 To study a formal model (personal view) Definition (and maybe history) Brief family tree: the branches and extensions Advantages and disadvantages for each Applications

More information

arxiv: v1 [cs.cr] 8 Mar 2015

arxiv: v1 [cs.cr] 8 Mar 2015 Attack Trees with Sequential Conjunction Ravi Jhawar 1, Barbara Kordy 2, Sjouke Mauw 1, Saša Radomirović 3, Rolando Trujillo-Rasua 1 arxiv:1503.02261v1 [cs.cr] 8 Mar 2015 1 University of Luxembourg, SnT,

More information

A Probabilistic Framework for Security Scenarios with Dependent Actions

A Probabilistic Framework for Security Scenarios with Dependent Actions A Probabilistic Framework for Security Scenarios with Dependent Actions Barbara Kordy 1,2, Marc Pouly 3, Patrick Schweitzer 1 1 University of Luxembourg, SnT, Luxembourg 2 INSA/IRISA, Rennes, France barbara.kordy,patrick.schweitzer@uni.lu

More information

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Quantitative Verification and Synthesis of Attack-Defence Scenarios Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of

More information

Cyber Security Games with Asymmetric Information

Cyber Security Games with Asymmetric Information Cyber Security Games with Asymmetric Information Jeff S. Shamma Georgia Institute of Technology Joint work with Georgios Kotsalis & Malachi Jones ARO MURI Annual Review November 15, 2012 Research Thrust:

More information

ADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes

ADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes ADVANCED ROBOTICS PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes Pedro U. Lima Instituto Superior Técnico/Instituto de Sistemas e Robótica September 2009 Reviewed April

More information

Cyber-Awareness and Games of Incomplete Information

Cyber-Awareness and Games of Incomplete Information Cyber-Awareness and Games of Incomplete Information Jeff S Shamma Georgia Institute of Technology ARO/MURI Annual Review August 23 24, 2010 Preview Game theoretic modeling formalisms Main issue: Information

More information

Propositional and Predicate Logic

Propositional and Predicate Logic Formal Verification of Software Propositional and Predicate Logic Bernhard Beckert UNIVERSITÄT KOBLENZ-LANDAU B. Beckert: Formal Verification of Software p.1 Propositional Logic: Syntax Special symbols

More information

Attack Graph Modeling and Generation

Attack Graph Modeling and Generation Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:

More information

Composition of product-form Generalized Stochastic Petri Nets: a modular approach

Composition of product-form Generalized Stochastic Petri Nets: a modular approach Composition of product-form Generalized Stochastic Petri Nets: a modular approach Università Ca Foscari di Venezia Dipartimento di Informatica Italy October 2009 Markov process: steady state analysis Problems

More information

Bayesian Networks Inference with Probabilistic Graphical Models

Bayesian Networks Inference with Probabilistic Graphical Models 4190.408 2016-Spring Bayesian Networks Inference with Probabilistic Graphical Models Byoung-Tak Zhang intelligence Lab Seoul National University 4190.408 Artificial (2016-Spring) 1 Machine Learning? Learning

More information

From Stochastic Processes to Stochastic Petri Nets

From Stochastic Processes to Stochastic Petri Nets From Stochastic Processes to Stochastic Petri Nets Serge Haddad LSV CNRS & ENS Cachan & INRIA Saclay Advanced Course on Petri Nets, the 16th September 2010, Rostock 1 Stochastic Processes and Markov Chains

More information

Varieties of Stochastic Calculi

Varieties of Stochastic Calculi Research is what I'm doing when I don't know what I'm doing. Wernher Von Braun. Artificial Biochemistry Varieties of Stochastic Calculi Microsoft Research Trento, 26-5-22..26 www.luca.demon.co.uk/artificialbiochemistry.htm

More information

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games A Polynomial-time Nash Equilibrium Algorithm for Repeated Games Michael L. Littman mlittman@cs.rutgers.edu Rutgers University Peter Stone pstone@cs.utexas.edu The University of Texas at Austin Main Result

More information

MODELLING DYNAMIC RELIABILITY VIA FLUID PETRI NETS

MODELLING DYNAMIC RELIABILITY VIA FLUID PETRI NETS MODELLING DYNAMIC RELIABILITY VIA FLUID PETRI NETS Daniele Codetta-Raiteri, Dipartimento di Informatica, Università di Torino, Italy Andrea Bobbio, Dipartimento di Informatica, Università del Piemonte

More information

Guided design of attack trees: a system-based approach

Guided design of attack trees: a system-based approach Guided design of attack trees: a system-based approach Maxime Audinot, Sophie Pinchinat Univ Rennes, CNRS, IRISA, Rennes, France {maxime.audinot, sophie.pinchinat}@irisa.fr Barbara Kordy Univ Rennes, INSA

More information

Specification models and their analysis Petri Nets

Specification models and their analysis Petri Nets Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented

More information

PRISM An overview. automatic verification of systems with stochastic behaviour e.g. due to unreliability, uncertainty, randomisation,

PRISM An overview. automatic verification of systems with stochastic behaviour e.g. due to unreliability, uncertainty, randomisation, PRISM An overview PRISM is a probabilistic model checker automatic verification of systems with stochastic behaviour e.g. due to unreliability, uncertainty, randomisation, Construction/analysis of probabilistic

More information

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning João P. Hespanha Kyriakos G. Vamvoudakis Cyber Situation Awareness Framework Mission Cyber-Assets Simulation/Live Security Exercises

More information

Uncertainty and Bayesian Networks

Uncertainty and Bayesian Networks Uncertainty and Bayesian Networks Tutorial 3 Tutorial 3 1 Outline Uncertainty Probability Syntax and Semantics for Uncertainty Inference Independence and Bayes Rule Syntax and Semantics for Bayesian Networks

More information

Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University

Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks Yang Cao Emory University 207..5 Outline Data Mining with Differential Privacy (DP) Scenario: Spatiotemporal Data

More information

SFM-11:CONNECT Summer School, Bertinoro, June 2011

SFM-11:CONNECT Summer School, Bertinoro, June 2011 SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision

More information

Pricing of Cyber Insurance Contracts in a Network Model

Pricing of Cyber Insurance Contracts in a Network Model Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December

More information

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions Electronic Notes in Theoretical Computer Science Vol. 85 No. 4 (2003) URL: http://www.elsevier.nl/locate/entsc/volume85.html Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions

More information

Cyber Security: Nonlinear Stochastic Models

Cyber Security: Nonlinear Stochastic Models Journal of Information Security, 07, 8, 5-40 http://www.scirp.org/journal/jis ISSN Online: 53-4 ISSN Print: 53-34 Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability Sasith M.

More information

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007 Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This

More information

Dynamic and Adversarial Reachavoid Symbolic Planning

Dynamic and Adversarial Reachavoid Symbolic Planning Dynamic and Adversarial Reachavoid Symbolic Planning Laya Shamgah Advisor: Dr. Karimoddini July 21 st 2017 Thrust 1: Modeling, Analysis and Control of Large-scale Autonomous Vehicles (MACLAV) Sub-trust

More information

Stochastic Simulation.

Stochastic Simulation. Stochastic Simulation. (and Gillespie s algorithm) Alberto Policriti Dipartimento di Matematica e Informatica Istituto di Genomica Applicata A. Policriti Stochastic Simulation 1/20 Quote of the day D.T.

More information

A Simple Model for Sequences of Relational State Descriptions

A Simple Model for Sequences of Relational State Descriptions A Simple Model for Sequences of Relational State Descriptions Ingo Thon, Niels Landwehr, and Luc De Raedt Department of Computer Science, Katholieke Universiteit Leuven, Celestijnenlaan 200A, 3001 Heverlee,

More information

Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo

Introduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia http://www.cybernetica.eu/ January 19th, 2010 University of Luxembourg We will use the basic multi-parameter

More information

Quantitative Model Checking (QMC) - SS12

Quantitative Model Checking (QMC) - SS12 Quantitative Model Checking (QMC) - SS12 Lecture 06 David Spieler Saarland University, Germany June 4, 2012 1 / 34 Deciding Bisimulations 2 / 34 Partition Refinement Algorithm Notation: A partition P over

More information

EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS

EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS Lecture 16, 6/1/2005 University of Washington, Department of Electrical Engineering Spring 2005 Instructor: Professor Jeff A. Bilmes Uncertainty & Bayesian Networks

More information

arxiv: v2 [cs.cr] 21 May 2018

arxiv: v2 [cs.cr] 21 May 2018 Article A Game-Theoretic Approach to Information-Flow Control via Protocol Composition arxiv:1803.10042v2 [cs.cr] 21 May 2018 Mário S. Alvim 1 ID, Konstantinos Chatzikokolakis 2,3 ID, Yusuke Kawamoto 4

More information

Four-Dimensional GLV Scalar Multiplication

Four-Dimensional GLV Scalar Multiplication Four-Dimensional GLV Scalar Multiplication ASIACRYPT 2012 Beijing, China Patrick Longa Microsoft Research Francesco Sica Nazarbayev University Elliptic Curve Scalar Multiplication A (Weierstrass) elliptic

More information

An Abstract Reduction Model for Computer Security Risk

An Abstract Reduction Model for Computer Security Risk CNAS REPORT CNAS-2008-005 Public Printed January 2008 Supersedes CNAS-2007-005 Dated Dec. 2007 An Abstract Reduction Model for Computer Security Risk Mohamed Hamdi Noureddine Boudriga Prepared by CN&S

More information

A brief introduction to Logic. (slides from

A brief introduction to Logic. (slides from A brief introduction to Logic (slides from http://www.decision-procedures.org/) 1 A Brief Introduction to Logic - Outline Propositional Logic :Syntax Propositional Logic :Semantics Satisfiability and validity

More information

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues Content What are Events? Examples for Problematic Event Semantics Inhibit, Enabler / Conditioning

More information

Optimizing the Decision to Expel Attackers from an Information System

Optimizing the Decision to Expel Attackers from an Information System Optimizing the Decision to Expel Attackers from an Information System Ning Bao and John Musacchio Abstract The conventional reaction after detecting an attacker in an information system is to expel the

More information

Scenario Graphs and Attack Graphs

Scenario Graphs and Attack Graphs Scenario Graphs and Attack Graphs Oleg Mikhail Sheyner CMU-CS-04-122 April 14, 2004 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh, PA Thesis Committee: Jeannette

More information

Introduction Probabilistic Programming ProPPA Inference Results Conclusions. Embedding Machine Learning in Stochastic Process Algebra.

Introduction Probabilistic Programming ProPPA Inference Results Conclusions. Embedding Machine Learning in Stochastic Process Algebra. Embedding Machine Learning in Stochastic Process Algebra Jane Hillston Joint work with Anastasis Georgoulas and Guido Sanguinetti, School of Informatics, University of Edinburgh 16th August 2017 quan col....

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

V&V MURI Overview Caltech, October 2008

V&V MURI Overview Caltech, October 2008 V&V MURI Overview Caltech, October 2008 Pablo A. Parrilo Laboratory for Information and Decision Systems Massachusetts Institute of Technology Goals!! Specification, design, and certification!! Coherent

More information

Learning in Zero-Sum Team Markov Games using Factored Value Functions

Learning in Zero-Sum Team Markov Games using Factored Value Functions Learning in Zero-Sum Team Markov Games using Factored Value Functions Michail G. Lagoudakis Department of Computer Science Duke University Durham, NC 27708 mgl@cs.duke.edu Ronald Parr Department of Computer

More information

FL I PIT: The Game of Stealthy Takeover

FL I PIT: The Game of Stealthy Takeover FL I PIT: The Game of Stealthy Takeover Marten van Dijk Ari Juels Alina Oprea Ronald L. Rivest Abstract Recent targeted attacks have increased significantly in sophistication, undermining the fundamental

More information

Quantitative evaluation of Dependability

Quantitative evaluation of Dependability Quantitative evaluation of Dependability 1 Quantitative evaluation of Dependability Faults are the cause of errors and failures. Does the arrival time of faults fit a probability distribution? If so, what

More information

Analyzing Multiple Logs for Forensic Evidence

Analyzing Multiple Logs for Forensic Evidence DIGITAL FORENSIC RESEARCH CONFERENCE Analyzing Multiple Logs for Forensic Evidence By Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha, and Mohamed Saleh Presented At The Digital Forensic Research Conference

More information

Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence

Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Christopher James Langmead August 2008 CMU-CS-08-151 School of Computer Science Carnegie Mellon University Pittsburgh,

More information

Outline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference

Outline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference Outline Logical Agents ECE57 Applied Artificial Intelligence Spring 007 Lecture #6 Logical reasoning Propositional Logic Wumpus World Inference Russell & Norvig, chapter 7 ECE57 Applied Artificial Intelligence

More information

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E

More information

arxiv: v1 [cs.lo] 21 Jan 2018

arxiv: v1 [cs.lo] 21 Jan 2018 An Intuitionistic Linear Logical Semantics of SAND Attack Trees Harley Eades III arxiv:1801.06886v1 [cs.lo] 21 Jan 2018 Computer Science Augusta University harley.eades@gmail.com Abstract. In this paper

More information

Exponential Moving Average Based Multiagent Reinforcement Learning Algorithms

Exponential Moving Average Based Multiagent Reinforcement Learning Algorithms Exponential Moving Average Based Multiagent Reinforcement Learning Algorithms Mostafa D. Awheda Department of Systems and Computer Engineering Carleton University Ottawa, Canada KS 5B6 Email: mawheda@sce.carleton.ca

More information

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution

More information

Bayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination

Bayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination Outline Syntax Semantics Exact inference by enumeration Exact inference by variable elimination s A simple, graphical notation for conditional independence assertions and hence for compact specication

More information

Risk Analysis of Highly-integrated Systems

Risk Analysis of Highly-integrated Systems Risk Analysis of Highly-integrated Systems RA II: Methods (FTA, ETA) Fault Tree Analysis (FTA) Problem description It is not possible to analyse complicated, highly-reliable or novel systems as black box

More information

Simple Counter-terrorism Decision

Simple Counter-terrorism Decision A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management Greg Parnell US Military Academy Jason R. W. Merrick Virginia Commonwealth University Simple Counter-terrorism

More information

Model-based Testing - From Safety to Security

Model-based Testing - From Safety to Security Model-based Testing - From Safety to Security Josip Bozic, Franz Wotawa Graz University of Technology {jbozic, wotawa}@ist.tugraz.at October 24, 2012 Josip Bozic, Franz Wotawa October 24, 2012 Page 1/28

More information

Comp487/587 - Boolean Formulas

Comp487/587 - Boolean Formulas Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested

More information

Logic, Knowledge Representation and Bayesian Decision Theory

Logic, Knowledge Representation and Bayesian Decision Theory Logic, Knowledge Representation and Bayesian Decision Theory David Poole University of British Columbia Overview Knowledge representation, logic, decision theory. Belief networks Independent Choice Logic

More information

Lecture 4 The stochastic ingredient

Lecture 4 The stochastic ingredient Lecture 4 The stochastic ingredient Luca Bortolussi 1 Alberto Policriti 2 1 Dipartimento di Matematica ed Informatica Università degli studi di Trieste Via Valerio 12/a, 34100 Trieste. luca@dmi.units.it

More information

Research Article Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic Petri Nets

Research Article Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic Petri Nets Aerospace Engineering Volume 2015, Article ID 171642, 8 pages http://dx.doi.org/10.55/2015/171642 Research Article Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic

More information

6 Reinforcement Learning

6 Reinforcement Learning 6 Reinforcement Learning As discussed above, a basic form of supervised learning is function approximation, relating input vectors to output vectors, or, more generally, finding density functions p(y,

More information

Trace Diagnostics using Temporal Implicants

Trace Diagnostics using Temporal Implicants Trace Diagnostics using Temporal Implicants ATVA 15 Thomas Ferrère 1 Dejan Nickovic 2 Oded Maler 1 1 VERIMAG, University of Grenoble / CNRS 2 Austrian Institute of Technology October 14, 2015 Motivation

More information

Analyzing fuzzy and contextual approaches to vagueness by semantic games

Analyzing fuzzy and contextual approaches to vagueness by semantic games Analyzing fuzzy and contextual approaches to vagueness by semantic games PhD Thesis Christoph Roschger Institute of Computer Languages Theory and Logic Group November 27, 2014 Motivation Vagueness ubiquitous

More information

Solving Deductive Games

Solving Deductive Games Solving Deductive Games Antonín Kučera (a joint work with Miroslav Klimoš) FI MU Brno Czech Republic Deductive games 2 players: codemaker + codebreaker codemakers selects a secret code codebreaker strives

More information

Stochastic Petri Net

Stochastic Petri Net Stochastic Petri Net Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2013, June 24th 2013 1 Stochastic Petri Net 2 Markov Chain 3 Markovian Stochastic Petri Net 4 Generalized

More information

Outline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference

Outline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference Outline Logical Agents ECE57 Applied Artificial Intelligence Spring 008 Lecture #6 Logical reasoning Propositional Logic Wumpus World Inference Russell & Norvig, chapter 7 ECE57 Applied Artificial Intelligence

More information

Timed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints

Timed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints Chapter 10 Timed Automata In the previous chapter, we have discussed a temporal logic where time was a discrete entities. A time unit was one application of the transition relation of an LTS. We could

More information

Probabilistic Graphical Networks: Definitions and Basic Results

Probabilistic Graphical Networks: Definitions and Basic Results This document gives a cursory overview of Probabilistic Graphical Networks. The material has been gleaned from different sources. I make no claim to original authorship of this material. Bayesian Graphical

More information

Dependable Computer Systems

Dependable Computer Systems Dependable Computer Systems Part 3: Fault-Tolerance and Modelling Contents Reliability: Basic Mathematical Model Example Failure Rate Functions Probabilistic Structural-Based Modeling: Part 1 Maintenance

More information

Some notes on Markov Decision Theory

Some notes on Markov Decision Theory Some notes on Markov Decision Theory Nikolaos Laoutaris laoutaris@di.uoa.gr January, 2004 1 Markov Decision Theory[1, 2, 3, 4] provides a methodology for the analysis of probabilistic sequential decision

More information

POLYNOMIAL SPACE QSAT. Games. Polynomial space cont d

POLYNOMIAL SPACE QSAT. Games. Polynomial space cont d T-79.5103 / Autumn 2008 Polynomial Space 1 T-79.5103 / Autumn 2008 Polynomial Space 3 POLYNOMIAL SPACE Polynomial space cont d Polynomial space-bounded computation has a variety of alternative characterizations

More information

3 : Representation of Undirected GM

3 : Representation of Undirected GM 10-708: Probabilistic Graphical Models 10-708, Spring 2016 3 : Representation of Undirected GM Lecturer: Eric P. Xing Scribes: Longqi Cai, Man-Chia Chang 1 MRF vs BN There are two types of graphical models:

More information

CS599 Lecture 1 Introduction To RL

CS599 Lecture 1 Introduction To RL CS599 Lecture 1 Introduction To RL Reinforcement Learning Introduction Learning from rewards Policies Value Functions Rewards Models of the Environment Exploitation vs. Exploration Dynamic Programming

More information

Constrained data assimilation. W. Carlisle Thacker Atlantic Oceanographic and Meteorological Laboratory Miami, Florida USA

Constrained data assimilation. W. Carlisle Thacker Atlantic Oceanographic and Meteorological Laboratory Miami, Florida USA Constrained data assimilation W. Carlisle Thacker Atlantic Oceanographic and Meteorological Laboratory Miami, Florida 33149 USA Plan Range constraints: : HYCOM layers have minimum thickness. Optimal interpolation:

More information

FAV i R This paper is produced mechanically as part of FAViR. See for more information.

FAV i R This paper is produced mechanically as part of FAViR. See  for more information. Bayesian Claim Severity Part 2 Mixed Exponentials with Trend, Censoring, and Truncation By Benedict Escoto FAV i R This paper is produced mechanically as part of FAViR. See http://www.favir.net for more

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

Bias-Variance Error Bounds for Temporal Difference Updates

Bias-Variance Error Bounds for Temporal Difference Updates Bias-Variance Bounds for Temporal Difference Updates Michael Kearns AT&T Labs mkearns@research.att.com Satinder Singh AT&T Labs baveja@research.att.com Abstract We give the first rigorous upper bounds

More information

PRISM: Probabilistic Model Checking for Performance and Reliability Analysis

PRISM: Probabilistic Model Checking for Performance and Reliability Analysis PRISM: Probabilistic Model Checking for Performance and Reliability Analysis Marta Kwiatkowska, Gethin Norman and David Parker Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford,

More information

What is (certain) Spatio-Temporal Data?

What is (certain) Spatio-Temporal Data? What is (certain) Spatio-Temporal Data? A spatio-temporal database stores triples (oid, time, loc) In the best case, this allows to look up the location of an object at any time 2 What is (certain) Spatio-Temporal

More information

Towards a Theory of Moving Target Defense

Towards a Theory of Moving Target Defense Towards a Theory of Moving Target Defense Rui Zhuang Scott A. DeLoach Xinming Ou Kansas State University Manhattan, KS USA {zrui, sdeloach, xou}@ksu.edu ABSTRACT The static nature of cyber systems gives

More information

An Infinite-Game Semantics for Well-Founded Negation in Logic Programming

An Infinite-Game Semantics for Well-Founded Negation in Logic Programming An Infinite-Game Semantics for Well-Founded Negation in Logic Programming Chrysida Galanaki a, Panos Rondogiannis a and William W. Wadge b a Department of Informatics & Telecommunications, University of

More information

Concept of Statistical Model Checking. Presented By: Diana EL RABIH

Concept of Statistical Model Checking. Presented By: Diana EL RABIH Concept of Statistical Model Checking Presented By: Diana EL RABIH Introduction Model checking of stochastic systems Continuous-time Markov chains Continuous Stochastic Logic (CSL) Probabilistic time-bounded

More information

Notes on Zero Knowledge

Notes on Zero Knowledge U.C. Berkeley CS172: Automata, Computability and Complexity Handout 9 Professor Luca Trevisan 4/21/2015 Notes on Zero Knowledge These notes on zero knowledge protocols for quadratic residuosity are based

More information

Solving Stochastic Planning Problems With Large State and Action Spaces

Solving Stochastic Planning Problems With Large State and Action Spaces Solving Stochastic Planning Problems With Large State and Action Spaces Thomas Dean, Robert Givan, and Kee-Eung Kim Thomas Dean and Kee-Eung Kim Robert Givan Department of Computer Science Department of

More information

Development of Multi-Unit Dependency Evaluation Model Using Markov Process and Monte Carlo Method

Development of Multi-Unit Dependency Evaluation Model Using Markov Process and Monte Carlo Method Development of Multi-Unit Dependency Evaluation Model Using Markov Process and Monte Carlo Method Sunghyon Jang, and Akira Yamaguchi Department of Nuclear Engineering and Management, The University of

More information

4 : Exact Inference: Variable Elimination

4 : Exact Inference: Variable Elimination 10-708: Probabilistic Graphical Models 10-708, Spring 2014 4 : Exact Inference: Variable Elimination Lecturer: Eric P. ing Scribes: Soumya Batra, Pradeep Dasigi, Manzil Zaheer 1 Probabilistic Inference

More information

Dependability Analysis

Dependability Analysis Software and Systems Verification (VIMIMA01) Dependability Analysis Istvan Majzik Budapest University of Technology and Economics Fault Tolerant Systems Research Group Budapest University of Technology

More information

Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity

Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity Sudip Saha Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial

More information

Modal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014

Modal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014 Modal Logic UIT2206: The Importance of Being Formal Martin Henz March 19, 2014 1 Motivation The source of meaning of formulas in the previous chapters were models. Once a particular model is chosen, say

More information

Chapter 4: Classical Propositional Semantics

Chapter 4: Classical Propositional Semantics Chapter 4: Classical Propositional Semantics Language : L {,,, }. Classical Semantics assumptions: TWO VALUES: there are only two logical values: truth (T) and false (F), and EXTENSIONALITY: the logical

More information

Quantitative model to measure the spread of Security attacks in Computer Networks

Quantitative model to measure the spread of Security attacks in Computer Networks Quantitative model to measure the spread of Security attacks in Computer Networks SAURABH BARANWAL M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur email: saurabhbrn@gmail.com,

More information

Playing Abstract games with Hidden States (Spatial and Non-Spatial).

Playing Abstract games with Hidden States (Spatial and Non-Spatial). Playing Abstract games with Hidden States (Spatial and Non-Spatial). Gregory Calbert, Hing-Wah Kwok Peter Smet, Jason Scholz, Michael Webb VE Group, C2D, DSTO. Report Documentation Page Form Approved OMB

More information

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford Probabilistic Model Checking Michaelmas Term 2011 Dr. Dave Parker Department of Computer Science University of Oxford Overview CSL model checking basic algorithm untimed properties time-bounded until the

More information

Internet Monetization

Internet Monetization Internet Monetization March May, 2013 Discrete time Finite A decision process (MDP) is reward process with decisions. It models an environment in which all states are and time is divided into stages. Definition

More information

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Introduction to Artificial Intelligence Propositional Logic & SAT Solving UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Today Representation in Propositional Logic Semantics & Deduction

More information

Software Verification

Software Verification Software Verification Grégoire Sutre LaBRI, University of Bordeaux, CNRS, France Summer School on Verification Technology, Systems & Applications September 2008 Grégoire Sutre Software Verification VTSA

More information

Stochastic2010 Page 1

Stochastic2010 Page 1 Stochastic2010 Page 1 Extinction Probability for Branching Processes Friday, April 02, 2010 2:03 PM Long-time properties for branching processes Clearly state 0 is an absorbing state, forming its own recurrent

More information

2 : Directed GMs: Bayesian Networks

2 : Directed GMs: Bayesian Networks 10-708: Probabilistic Graphical Models, Spring 2015 2 : Directed GMs: Bayesian Networks Lecturer: Eric P. Xing Scribes: Yi Cheng, Cong Lu 1 Notation Here the notations used in this course are defined:

More information