A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
|
|
- Miranda Lamb
- 6 years ago
- Views:
Transcription
1 1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project
2 2 / 35 Plan Introduction 1 Introduction Cyber attacks nowadays Graphical security models Quantitative analysis of security models 2 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics
3 Cyber attacks nowadays Cyber attacks nowadays Graphical security models Quantitative analysis of security models Cyber attacks are becoming more and more: Complex, Organized, Distributed and Sophisticated. Their impact therefore is sometimes weighty, in some cases not tolerable. 3 / 35
4 Graphical security models Cyber attacks nowadays Graphical security models Quantitative analysis of security models To fend of cyber attacks negative impact, research efforts have come with the development and design of security models: 4 / 35
5 Graphical security models Cyber attacks nowadays Graphical security models Quantitative analysis of security models Attack trees: A tree-based model for cyber attacks representation. Introduced by Schneier in Attack graphs: A directed graph-based model for cyber attacks representation. Attack countermeasures trees: A tree-based model to graphically represent attacks and defenses in the same layout. Attack-defense trees: Extend the attack tree model with refinable countermeasures. Introduced by Kordy et al. in / 35
6 Cyber attacks nowadays Graphical security models Quantitative analysis of security models Quantitative analysis of security models - How? Quantitative analysis is performed either by the use of analytical approach relying on Baysian Networks, Petri Nets, Markov chains or simulations such as Discrete simulation, Monte Carlo simulation. - By? Computing metrics or attributes like : Probability of an attack or a scenario in a given time, cost of the attacks, efficiency of countermeasures, mean time to breach a system, the most probable scenario,... - Why? Perform quantitative analysis which will help to reduce the risk and the negative impact of cyber attacks. 6 / 35
7 7 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics - What is it? Graphical methodology. - Used for? Security scenario representation. - Ancestor? Attack Trees. - Interpretation: Can be seen as game between two players (proponent vs opponent). - Semantics: Multisets, De Morgan lattice, Equational, Propositional, Series-Parallel graphs. - Practice: Used in industry.
8 8 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Graphically: Compromise Server Prevent target identification Network Scanning Escalate privileges Execute dangerous commands IP address space randomization Mutable network Target Exploitation Password Brute force Frequent patch development Vulnerabilities Scanning Use Vulnerability Exploit Password changing policy
9 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Definition 1 ADTrees are defined by means of an abstract syntax called ADTerms, typed-terms over the signature Σ = (S, F), where : S = {p, o} is the set of types of players. F = {( p k ) k N, ( p k ) k N, ( p k ) k N, ( o k ) k N, ( o k ) k N, ( o k ) k N, c p, c o } B p B o is a set of function symbols. Definition 2 ADTrees are closed-terms over the signature Σ = (S, F), and generated by the following grammar, where b s B and s S: t : b s s (t,..., t) s (t,..., t) s (t,..., t) c s (t, t) 9 / 35
10 10 / 35 ADTrees Introduction ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Examples of ADTerms : t 0 = b p (Basic event) t 1 = p (b p 0, t 0) (Disjunction refinement) t 2 = p (t 1, b p 1 ) (Conjunction refinement) t 3 = p (t 2, b p 2, bp 3 ) (Sequential Conjunction refinement) t 4 = c p (t 3, b0 o) (Counter-defense)
11 ADTree Quantitative Evaluation ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics The quantitative evaluation of an ADTree consists in assessing a set of attributes like:probability, cost, or time. It is performed through the standard bottom-up procedure. 11 / 35
12 ADTree Quantitative Evaluation ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics Standard Bottom-up procedure (ADTool): 12 / 35
13 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics However 1 The bottom-up procedure works only for independent events. 2 So far, there is only one approach [KPS14] 1 for quantitative analysis of ADTree with dependent actions. 3 Only discrete analysis can be done. 1. B. Kordy, M. Pouly, and P. Schweitzer. A probabilistic framework for security scenarios with dependent actions. In International Conference on Integrated Formal Methods, , / 35
14 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics We need to develop a new semantics for ADTree. The new semantics should allow dependent events to occur, and provide modeling capabilities for defense in a more realistic way. It should also provide a continuous analysis method for ADTree evaluation. 14 / 35
15 ADTrees ADTree Quantitative Evaluation ADTree and need for a new semantics ADTree and need for a new semantics We proposed to use : Continuous Time Markov Chain or CTMC as a new semantics for ADTree. We model attacks/defense execution using exponential distribution (good for delayed impact defenses). Using the analytical approach of CTMCs, we can evaluate several attributes, and perform a continuous analysis by the use of Cumulative Distribution Function. 15 / 35
16 Definition 1 A Continuous Time Markov chain is a tuple (S, G, π), where: S is a finite disjoint set of states. G : S S R is the infinitesimal generator matrix which gives the rate of transition between two states s S and s S. π : S [0, 1] is the initial probability distribution on S. λ 1 λ 3 λ 2 16 / 35
17 Definition 2 An explicit continuous time Markov chain M is a tuple (S, S 0, S, G), where: S is a finite disjoint set of states. S 0 S is a finite set of initial states. S S is a finite set of final states. G : S S R is the infinitesimal generator matrix which gives the rate of transition between two states s S and s S. 17 / 35
18 Introduction We have formally defined the semantics of ADTrees in terms of CTMC for each component : Basic events, conjunction refinement, Disjunction refinement, Sequential conjunction refinement, and Countermeasure. 18 / 35
19 Introduction 19 / 35
20 Introduction 20 / 35
21 Introduction 21 / 35
22 Introduction 22 / 35
23 We took an example study: Compromise Server Prevent target identification Network Scanning Escalate privileges Execute dangerous commands IP address space randomization Mutable network Target Exploitation Password Brute force Frequent patch development Vulnerabilities Scanning Use Vulnerability Exploit Password changing policy 23 / 35
24 24 / 35 Introduction We obtain a final CTMC representing the entire ADTree: λ b p 4 λ b p 5 λ b o 2 λ b p 0 λ b o 2 λ p b 3 λ p b 2 λ b o 0 + λ b o 1 λ b p 1 λ p b 1 λ b o 3 λ b o 3 λ b p 2 λ b p 5
25 We have assessed three situational cases: 1 Attack tree (No defense is considered) 2 Adding countermeasure (Prevent target identification) 3 Adding the remaining countermeasures (Password policy, Frequent patches). 25 / 35
26 26 / 35
27 Analytical approach using CTMC is performed as follow: 27 / 35
28 Probabilistic attributes: Probability of final states (black states) representing the final goals G 1 and G 2 Probability G 1 (case 1) G 1 (case 2) G 1 (case 3) G 2 (case 1) G 2 (case 2) G 2 (case 3) Time (Unit) 28 / 35
29 Probabilistic attributes: Probability of final states (black states) representing the final goal G 1 + G 2 Final Goal(case 1) Final Goal(case 2) Final Goal(case 3) Probability Time (Unit) 29 / 35
30 Probabilistic attributes: Expected number of steps for each scenario of G 1 and G 2 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C3 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C2 [b p 0 ; bp 1 ; bp 2 ; bp 5 ]C [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C3 [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C2 [b p 0 ; bp 2 ; bp 1 ; bp 5 ]C [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C3 [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C2 [b p 0 ; bp 3 ; bp 4 ; bp 5 ]C / 35
31 Probabilistic attributes: Absorbing probabilities for G 1 and G 2 Probability (%) Case 1 Case 2 Case 3 Absorbing probabilities G 1 G 2 31 / 35
32 Timed attributes: Mean time to security failure 4 Time (Unit) Case 1 Case 2 Case 3 Mean Time To Security Failure 32 / 35
33 Introduction We proposed a new semantics for ADTrees in terms of CTMCs. We applied CTMC to perform quantitative analysis of ADTree with dependent actions. 33 / 35
34 Challenges and Future Work Challenges : Not all attacks and/or countermeasures execution follow exponential-distribution. Estimating the rates for attacks/countermeasures has always been the main challenge for security assessment. Future Work : Extend our framework in order to accurately model social attacks and complex behaviors laying on other distributions. Embed the framework within the ADTool software and make it more adaptable for real life security scenarios. 34 / 35
35 35 / 35 Thanks for your attention Any questions?
Probabilistic Reasoning with Graphical Security Models
Probabilistic Reasoning with Graphical Security Models Barbara Kordy a,b,, Marc Pouly c, Patrick Schweitzer b a INSA Rennes, IRISA, France b University of Luxembourg, SnT, Luxembourg c Lucerne University
More informationProbabilistic Assessment of Security Scenarios Challenges and Solutions
Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014 Barbara
More informationStochastic Petri Net. Ben, Yue (Cindy) 2013/05/08
Stochastic Petri Net 2013/05/08 2 To study a formal model (personal view) Definition (and maybe history) Brief family tree: the branches and extensions Advantages and disadvantages for each Applications
More informationarxiv: v1 [cs.cr] 8 Mar 2015
Attack Trees with Sequential Conjunction Ravi Jhawar 1, Barbara Kordy 2, Sjouke Mauw 1, Saša Radomirović 3, Rolando Trujillo-Rasua 1 arxiv:1503.02261v1 [cs.cr] 8 Mar 2015 1 University of Luxembourg, SnT,
More informationA Probabilistic Framework for Security Scenarios with Dependent Actions
A Probabilistic Framework for Security Scenarios with Dependent Actions Barbara Kordy 1,2, Marc Pouly 3, Patrick Schweitzer 1 1 University of Luxembourg, SnT, Luxembourg 2 INSA/IRISA, Rennes, France barbara.kordy,patrick.schweitzer@uni.lu
More informationQuantitative Verification and Synthesis of Attack-Defence Scenarios
Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of
More informationCyber Security Games with Asymmetric Information
Cyber Security Games with Asymmetric Information Jeff S. Shamma Georgia Institute of Technology Joint work with Georgios Kotsalis & Malachi Jones ARO MURI Annual Review November 15, 2012 Research Thrust:
More informationADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes
ADVANCED ROBOTICS PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes Pedro U. Lima Instituto Superior Técnico/Instituto de Sistemas e Robótica September 2009 Reviewed April
More informationCyber-Awareness and Games of Incomplete Information
Cyber-Awareness and Games of Incomplete Information Jeff S Shamma Georgia Institute of Technology ARO/MURI Annual Review August 23 24, 2010 Preview Game theoretic modeling formalisms Main issue: Information
More informationPropositional and Predicate Logic
Formal Verification of Software Propositional and Predicate Logic Bernhard Beckert UNIVERSITÄT KOBLENZ-LANDAU B. Beckert: Formal Verification of Software p.1 Propositional Logic: Syntax Special symbols
More informationAttack Graph Modeling and Generation
Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:
More informationComposition of product-form Generalized Stochastic Petri Nets: a modular approach
Composition of product-form Generalized Stochastic Petri Nets: a modular approach Università Ca Foscari di Venezia Dipartimento di Informatica Italy October 2009 Markov process: steady state analysis Problems
More informationBayesian Networks Inference with Probabilistic Graphical Models
4190.408 2016-Spring Bayesian Networks Inference with Probabilistic Graphical Models Byoung-Tak Zhang intelligence Lab Seoul National University 4190.408 Artificial (2016-Spring) 1 Machine Learning? Learning
More informationFrom Stochastic Processes to Stochastic Petri Nets
From Stochastic Processes to Stochastic Petri Nets Serge Haddad LSV CNRS & ENS Cachan & INRIA Saclay Advanced Course on Petri Nets, the 16th September 2010, Rostock 1 Stochastic Processes and Markov Chains
More informationVarieties of Stochastic Calculi
Research is what I'm doing when I don't know what I'm doing. Wernher Von Braun. Artificial Biochemistry Varieties of Stochastic Calculi Microsoft Research Trento, 26-5-22..26 www.luca.demon.co.uk/artificialbiochemistry.htm
More informationA Polynomial-time Nash Equilibrium Algorithm for Repeated Games
A Polynomial-time Nash Equilibrium Algorithm for Repeated Games Michael L. Littman mlittman@cs.rutgers.edu Rutgers University Peter Stone pstone@cs.utexas.edu The University of Texas at Austin Main Result
More informationMODELLING DYNAMIC RELIABILITY VIA FLUID PETRI NETS
MODELLING DYNAMIC RELIABILITY VIA FLUID PETRI NETS Daniele Codetta-Raiteri, Dipartimento di Informatica, Università di Torino, Italy Andrea Bobbio, Dipartimento di Informatica, Università del Piemonte
More informationGuided design of attack trees: a system-based approach
Guided design of attack trees: a system-based approach Maxime Audinot, Sophie Pinchinat Univ Rennes, CNRS, IRISA, Rennes, France {maxime.audinot, sophie.pinchinat}@irisa.fr Barbara Kordy Univ Rennes, INSA
More informationSpecification models and their analysis Petri Nets
Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented
More informationPRISM An overview. automatic verification of systems with stochastic behaviour e.g. due to unreliability, uncertainty, randomisation,
PRISM An overview PRISM is a probabilistic model checker automatic verification of systems with stochastic behaviour e.g. due to unreliability, uncertainty, randomisation, Construction/analysis of probabilistic
More informationDetection and Mitigation of Cyber-Attacks Using Game Theory and Learning
Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning João P. Hespanha Kyriakos G. Vamvoudakis Cyber Situation Awareness Framework Mission Cyber-Assets Simulation/Live Security Exercises
More informationUncertainty and Bayesian Networks
Uncertainty and Bayesian Networks Tutorial 3 Tutorial 3 1 Outline Uncertainty Probability Syntax and Semantics for Uncertainty Inference Independence and Bayes Rule Syntax and Semantics for Bayesian Networks
More informationModeling Data Correlations in Private Data Mining with Markov Model and Markov Networks. Yang Cao Emory University
Modeling Data Correlations in Private Data Mining with Markov Model and Markov Networks Yang Cao Emory University 207..5 Outline Data Mining with Differential Privacy (DP) Scenario: Spatiotemporal Data
More informationSFM-11:CONNECT Summer School, Bertinoro, June 2011
SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision
More informationPricing of Cyber Insurance Contracts in a Network Model
Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December
More informationProxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions
Electronic Notes in Theoretical Computer Science Vol. 85 No. 4 (2003) URL: http://www.elsevier.nl/locate/entsc/volume85.html Proxel-Based Simulation of Stochastic Petri Nets Containing Immediate Transitions
More informationCyber Security: Nonlinear Stochastic Models
Journal of Information Security, 07, 8, 5-40 http://www.scirp.org/journal/jis ISSN Online: 53-4 ISSN Print: 53-34 Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability Sasith M.
More informationDynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007
Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This
More informationDynamic and Adversarial Reachavoid Symbolic Planning
Dynamic and Adversarial Reachavoid Symbolic Planning Laya Shamgah Advisor: Dr. Karimoddini July 21 st 2017 Thrust 1: Modeling, Analysis and Control of Large-scale Autonomous Vehicles (MACLAV) Sub-trust
More informationStochastic Simulation.
Stochastic Simulation. (and Gillespie s algorithm) Alberto Policriti Dipartimento di Matematica e Informatica Istituto di Genomica Applicata A. Policriti Stochastic Simulation 1/20 Quote of the day D.T.
More informationA Simple Model for Sequences of Relational State Descriptions
A Simple Model for Sequences of Relational State Descriptions Ingo Thon, Niels Landwehr, and Luc De Raedt Department of Computer Science, Katholieke Universiteit Leuven, Celestijnenlaan 200A, 3001 Heverlee,
More informationIntroduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo
Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia http://www.cybernetica.eu/ January 19th, 2010 University of Luxembourg We will use the basic multi-parameter
More informationQuantitative Model Checking (QMC) - SS12
Quantitative Model Checking (QMC) - SS12 Lecture 06 David Spieler Saarland University, Germany June 4, 2012 1 / 34 Deciding Bisimulations 2 / 34 Partition Refinement Algorithm Notation: A partition P over
More informationEE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS
EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS Lecture 16, 6/1/2005 University of Washington, Department of Electrical Engineering Spring 2005 Instructor: Professor Jeff A. Bilmes Uncertainty & Bayesian Networks
More informationarxiv: v2 [cs.cr] 21 May 2018
Article A Game-Theoretic Approach to Information-Flow Control via Protocol Composition arxiv:1803.10042v2 [cs.cr] 21 May 2018 Mário S. Alvim 1 ID, Konstantinos Chatzikokolakis 2,3 ID, Yusuke Kawamoto 4
More informationFour-Dimensional GLV Scalar Multiplication
Four-Dimensional GLV Scalar Multiplication ASIACRYPT 2012 Beijing, China Patrick Longa Microsoft Research Francesco Sica Nazarbayev University Elliptic Curve Scalar Multiplication A (Weierstrass) elliptic
More informationAn Abstract Reduction Model for Computer Security Risk
CNAS REPORT CNAS-2008-005 Public Printed January 2008 Supersedes CNAS-2007-005 Dated Dec. 2007 An Abstract Reduction Model for Computer Security Risk Mohamed Hamdi Noureddine Boudriga Prepared by CN&S
More informationA brief introduction to Logic. (slides from
A brief introduction to Logic (slides from http://www.decision-procedures.org/) 1 A Brief Introduction to Logic - Outline Propositional Logic :Syntax Propositional Logic :Semantics Satisfiability and validity
More informationSafety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues
(Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues Content What are Events? Examples for Problematic Event Semantics Inhibit, Enabler / Conditioning
More informationOptimizing the Decision to Expel Attackers from an Information System
Optimizing the Decision to Expel Attackers from an Information System Ning Bao and John Musacchio Abstract The conventional reaction after detecting an attacker in an information system is to expel the
More informationScenario Graphs and Attack Graphs
Scenario Graphs and Attack Graphs Oleg Mikhail Sheyner CMU-CS-04-122 April 14, 2004 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh, PA Thesis Committee: Jeannette
More informationIntroduction Probabilistic Programming ProPPA Inference Results Conclusions. Embedding Machine Learning in Stochastic Process Algebra.
Embedding Machine Learning in Stochastic Process Algebra Jane Hillston Joint work with Anastasis Georgoulas and Guido Sanguinetti, School of Informatics, University of Edinburgh 16th August 2017 quan col....
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationV&V MURI Overview Caltech, October 2008
V&V MURI Overview Caltech, October 2008 Pablo A. Parrilo Laboratory for Information and Decision Systems Massachusetts Institute of Technology Goals!! Specification, design, and certification!! Coherent
More informationLearning in Zero-Sum Team Markov Games using Factored Value Functions
Learning in Zero-Sum Team Markov Games using Factored Value Functions Michail G. Lagoudakis Department of Computer Science Duke University Durham, NC 27708 mgl@cs.duke.edu Ronald Parr Department of Computer
More informationFL I PIT: The Game of Stealthy Takeover
FL I PIT: The Game of Stealthy Takeover Marten van Dijk Ari Juels Alina Oprea Ronald L. Rivest Abstract Recent targeted attacks have increased significantly in sophistication, undermining the fundamental
More informationQuantitative evaluation of Dependability
Quantitative evaluation of Dependability 1 Quantitative evaluation of Dependability Faults are the cause of errors and failures. Does the arrival time of faults fit a probability distribution? If so, what
More informationAnalyzing Multiple Logs for Forensic Evidence
DIGITAL FORENSIC RESEARCH CONFERENCE Analyzing Multiple Logs for Forensic Evidence By Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha, and Mohamed Saleh Presented At The Digital Forensic Research Conference
More informationTowards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence
Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Christopher James Langmead August 2008 CMU-CS-08-151 School of Computer Science Carnegie Mellon University Pittsburgh,
More informationOutline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference
Outline Logical Agents ECE57 Applied Artificial Intelligence Spring 007 Lecture #6 Logical reasoning Propositional Logic Wumpus World Inference Russell & Norvig, chapter 7 ECE57 Applied Artificial Intelligence
More informationR E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.
R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E
More informationarxiv: v1 [cs.lo] 21 Jan 2018
An Intuitionistic Linear Logical Semantics of SAND Attack Trees Harley Eades III arxiv:1801.06886v1 [cs.lo] 21 Jan 2018 Computer Science Augusta University harley.eades@gmail.com Abstract. In this paper
More informationExponential Moving Average Based Multiagent Reinforcement Learning Algorithms
Exponential Moving Average Based Multiagent Reinforcement Learning Algorithms Mostafa D. Awheda Department of Systems and Computer Engineering Carleton University Ottawa, Canada KS 5B6 Email: mawheda@sce.carleton.ca
More informationRecap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks
Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution
More informationBayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination
Outline Syntax Semantics Exact inference by enumeration Exact inference by variable elimination s A simple, graphical notation for conditional independence assertions and hence for compact specication
More informationRisk Analysis of Highly-integrated Systems
Risk Analysis of Highly-integrated Systems RA II: Methods (FTA, ETA) Fault Tree Analysis (FTA) Problem description It is not possible to analyse complicated, highly-reliable or novel systems as black box
More informationSimple Counter-terrorism Decision
A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management Greg Parnell US Military Academy Jason R. W. Merrick Virginia Commonwealth University Simple Counter-terrorism
More informationModel-based Testing - From Safety to Security
Model-based Testing - From Safety to Security Josip Bozic, Franz Wotawa Graz University of Technology {jbozic, wotawa}@ist.tugraz.at October 24, 2012 Josip Bozic, Franz Wotawa October 24, 2012 Page 1/28
More informationComp487/587 - Boolean Formulas
Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested
More informationLogic, Knowledge Representation and Bayesian Decision Theory
Logic, Knowledge Representation and Bayesian Decision Theory David Poole University of British Columbia Overview Knowledge representation, logic, decision theory. Belief networks Independent Choice Logic
More informationLecture 4 The stochastic ingredient
Lecture 4 The stochastic ingredient Luca Bortolussi 1 Alberto Policriti 2 1 Dipartimento di Matematica ed Informatica Università degli studi di Trieste Via Valerio 12/a, 34100 Trieste. luca@dmi.units.it
More informationResearch Article Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic Petri Nets
Aerospace Engineering Volume 2015, Article ID 171642, 8 pages http://dx.doi.org/10.55/2015/171642 Research Article Research on Dynamic Reliability of a Jet Pipe Servo Valve Based on Generalized Stochastic
More information6 Reinforcement Learning
6 Reinforcement Learning As discussed above, a basic form of supervised learning is function approximation, relating input vectors to output vectors, or, more generally, finding density functions p(y,
More informationTrace Diagnostics using Temporal Implicants
Trace Diagnostics using Temporal Implicants ATVA 15 Thomas Ferrère 1 Dejan Nickovic 2 Oded Maler 1 1 VERIMAG, University of Grenoble / CNRS 2 Austrian Institute of Technology October 14, 2015 Motivation
More informationAnalyzing fuzzy and contextual approaches to vagueness by semantic games
Analyzing fuzzy and contextual approaches to vagueness by semantic games PhD Thesis Christoph Roschger Institute of Computer Languages Theory and Logic Group November 27, 2014 Motivation Vagueness ubiquitous
More informationSolving Deductive Games
Solving Deductive Games Antonín Kučera (a joint work with Miroslav Klimoš) FI MU Brno Czech Republic Deductive games 2 players: codemaker + codebreaker codemakers selects a secret code codebreaker strives
More informationStochastic Petri Net
Stochastic Petri Net Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2013, June 24th 2013 1 Stochastic Petri Net 2 Markov Chain 3 Markovian Stochastic Petri Net 4 Generalized
More informationOutline. Logical Agents. Logical Reasoning. Knowledge Representation. Logical reasoning Propositional Logic Wumpus World Inference
Outline Logical Agents ECE57 Applied Artificial Intelligence Spring 008 Lecture #6 Logical reasoning Propositional Logic Wumpus World Inference Russell & Norvig, chapter 7 ECE57 Applied Artificial Intelligence
More informationTimed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints
Chapter 10 Timed Automata In the previous chapter, we have discussed a temporal logic where time was a discrete entities. A time unit was one application of the transition relation of an LTS. We could
More informationProbabilistic Graphical Networks: Definitions and Basic Results
This document gives a cursory overview of Probabilistic Graphical Networks. The material has been gleaned from different sources. I make no claim to original authorship of this material. Bayesian Graphical
More informationDependable Computer Systems
Dependable Computer Systems Part 3: Fault-Tolerance and Modelling Contents Reliability: Basic Mathematical Model Example Failure Rate Functions Probabilistic Structural-Based Modeling: Part 1 Maintenance
More informationSome notes on Markov Decision Theory
Some notes on Markov Decision Theory Nikolaos Laoutaris laoutaris@di.uoa.gr January, 2004 1 Markov Decision Theory[1, 2, 3, 4] provides a methodology for the analysis of probabilistic sequential decision
More informationPOLYNOMIAL SPACE QSAT. Games. Polynomial space cont d
T-79.5103 / Autumn 2008 Polynomial Space 1 T-79.5103 / Autumn 2008 Polynomial Space 3 POLYNOMIAL SPACE Polynomial space cont d Polynomial space-bounded computation has a variety of alternative characterizations
More information3 : Representation of Undirected GM
10-708: Probabilistic Graphical Models 10-708, Spring 2016 3 : Representation of Undirected GM Lecturer: Eric P. Xing Scribes: Longqi Cai, Man-Chia Chang 1 MRF vs BN There are two types of graphical models:
More informationCS599 Lecture 1 Introduction To RL
CS599 Lecture 1 Introduction To RL Reinforcement Learning Introduction Learning from rewards Policies Value Functions Rewards Models of the Environment Exploitation vs. Exploration Dynamic Programming
More informationConstrained data assimilation. W. Carlisle Thacker Atlantic Oceanographic and Meteorological Laboratory Miami, Florida USA
Constrained data assimilation W. Carlisle Thacker Atlantic Oceanographic and Meteorological Laboratory Miami, Florida 33149 USA Plan Range constraints: : HYCOM layers have minimum thickness. Optimal interpolation:
More informationFAV i R This paper is produced mechanically as part of FAViR. See for more information.
Bayesian Claim Severity Part 2 Mixed Exponentials with Trend, Censoring, and Truncation By Benedict Escoto FAV i R This paper is produced mechanically as part of FAViR. See http://www.favir.net for more
More information7. Queueing Systems. 8. Petri nets vs. State Automata
Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models
More informationBias-Variance Error Bounds for Temporal Difference Updates
Bias-Variance Bounds for Temporal Difference Updates Michael Kearns AT&T Labs mkearns@research.att.com Satinder Singh AT&T Labs baveja@research.att.com Abstract We give the first rigorous upper bounds
More informationPRISM: Probabilistic Model Checking for Performance and Reliability Analysis
PRISM: Probabilistic Model Checking for Performance and Reliability Analysis Marta Kwiatkowska, Gethin Norman and David Parker Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford,
More informationWhat is (certain) Spatio-Temporal Data?
What is (certain) Spatio-Temporal Data? A spatio-temporal database stores triples (oid, time, loc) In the best case, this allows to look up the location of an object at any time 2 What is (certain) Spatio-Temporal
More informationTowards a Theory of Moving Target Defense
Towards a Theory of Moving Target Defense Rui Zhuang Scott A. DeLoach Xinming Ou Kansas State University Manhattan, KS USA {zrui, sdeloach, xou}@ksu.edu ABSTRACT The static nature of cyber systems gives
More informationAn Infinite-Game Semantics for Well-Founded Negation in Logic Programming
An Infinite-Game Semantics for Well-Founded Negation in Logic Programming Chrysida Galanaki a, Panos Rondogiannis a and William W. Wadge b a Department of Informatics & Telecommunications, University of
More informationConcept of Statistical Model Checking. Presented By: Diana EL RABIH
Concept of Statistical Model Checking Presented By: Diana EL RABIH Introduction Model checking of stochastic systems Continuous-time Markov chains Continuous Stochastic Logic (CSL) Probabilistic time-bounded
More informationNotes on Zero Knowledge
U.C. Berkeley CS172: Automata, Computability and Complexity Handout 9 Professor Luca Trevisan 4/21/2015 Notes on Zero Knowledge These notes on zero knowledge protocols for quadratic residuosity are based
More informationSolving Stochastic Planning Problems With Large State and Action Spaces
Solving Stochastic Planning Problems With Large State and Action Spaces Thomas Dean, Robert Givan, and Kee-Eung Kim Thomas Dean and Kee-Eung Kim Robert Givan Department of Computer Science Department of
More informationDevelopment of Multi-Unit Dependency Evaluation Model Using Markov Process and Monte Carlo Method
Development of Multi-Unit Dependency Evaluation Model Using Markov Process and Monte Carlo Method Sunghyon Jang, and Akira Yamaguchi Department of Nuclear Engineering and Management, The University of
More information4 : Exact Inference: Variable Elimination
10-708: Probabilistic Graphical Models 10-708, Spring 2014 4 : Exact Inference: Variable Elimination Lecturer: Eric P. ing Scribes: Soumya Batra, Pradeep Dasigi, Manzil Zaheer 1 Probabilistic Inference
More informationDependability Analysis
Software and Systems Verification (VIMIMA01) Dependability Analysis Istvan Majzik Budapest University of Technology and Economics Fault Tolerant Systems Research Group Budapest University of Technology
More informationContaining Cascading Failures in Networks: Applications to Epidemics and Cybersecurity
Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity Sudip Saha Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial
More informationModal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014
Modal Logic UIT2206: The Importance of Being Formal Martin Henz March 19, 2014 1 Motivation The source of meaning of formulas in the previous chapters were models. Once a particular model is chosen, say
More informationChapter 4: Classical Propositional Semantics
Chapter 4: Classical Propositional Semantics Language : L {,,, }. Classical Semantics assumptions: TWO VALUES: there are only two logical values: truth (T) and false (F), and EXTENSIONALITY: the logical
More informationQuantitative model to measure the spread of Security attacks in Computer Networks
Quantitative model to measure the spread of Security attacks in Computer Networks SAURABH BARANWAL M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur email: saurabhbrn@gmail.com,
More informationPlaying Abstract games with Hidden States (Spatial and Non-Spatial).
Playing Abstract games with Hidden States (Spatial and Non-Spatial). Gregory Calbert, Hing-Wah Kwok Peter Smet, Jason Scholz, Michael Webb VE Group, C2D, DSTO. Report Documentation Page Form Approved OMB
More informationProbabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford
Probabilistic Model Checking Michaelmas Term 2011 Dr. Dave Parker Department of Computer Science University of Oxford Overview CSL model checking basic algorithm untimed properties time-bounded until the
More informationInternet Monetization
Internet Monetization March May, 2013 Discrete time Finite A decision process (MDP) is reward process with decisions. It models an environment in which all states are and time is divided into stages. Definition
More informationIntroduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010
Introduction to Artificial Intelligence Propositional Logic & SAT Solving UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Today Representation in Propositional Logic Semantics & Deduction
More informationSoftware Verification
Software Verification Grégoire Sutre LaBRI, University of Bordeaux, CNRS, France Summer School on Verification Technology, Systems & Applications September 2008 Grégoire Sutre Software Verification VTSA
More informationStochastic2010 Page 1
Stochastic2010 Page 1 Extinction Probability for Branching Processes Friday, April 02, 2010 2:03 PM Long-time properties for branching processes Clearly state 0 is an absorbing state, forming its own recurrent
More information2 : Directed GMs: Bayesian Networks
10-708: Probabilistic Graphical Models, Spring 2015 2 : Directed GMs: Bayesian Networks Lecturer: Eric P. Xing Scribes: Yi Cheng, Cong Lu 1 Notation Here the notations used in this course are defined:
More information