Probabilistic Assessment of Security Scenarios Challenges and Solutions
|
|
- Lenard Jackson
- 5 years ago
- Views:
Transcription
1 Probabilistic Assessment of Security Scenarios Challenges and Solutions Barbara Kordy Joint work with Marc Pouly, Patrick Schweitzer Formal Methods and Security seminar INRIA Rennes, May 16, 2014
2 Barbara Kordy 2 Who am I? Ph.D. Student and Moniteur, Université d Orléans, France Automates pour l Analyse de Documents XML Compressés, Applications à la Sécurité d Accès Research Associate, University of Luxembourg Formal methods for modeling and analysis of real-life security problems
3 Barbara Kordy 3 Probabilistic Assessment of Security Scenarios security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
4 Barbara Kordy 4 Outline 1 Attack defense Trees 2 Probabilistic Evaluation 3 Efficiency Considerations 4 Wrap Up
5 Attack defense Trees Barbara Kordy 5 Modeling Security Scenarios Attack defense tree (ADTree) [FAST 10] Tree-like representation of an attack defense scenario depicting: How to attack a system How to protect against an attack Extend the industrially recognized model of attack trees [Schneier 99] Integrate Intuitive representation features [IJSSE 12, ICISC 12] Formal analysis techniques [GameSec 10, SIIS 11, JLC 14] Software application ADTool [QEST 13]
6 Attack defense Trees Barbara Kordy 6 Example: ADTree for Infecting a Computer infect computer virus on system execute virus with attachment USB stick antivirus install antivirus run antivirus fake antivirus
7 Attack defense Trees Barbara Kordy 7 Propositional Semantics for ADTrees [SIIS 11] B the set of non-refined nodes of ADTree t x {0, 1} B encodes whether actions from B succeed or not Action A B succeeds if x(a) = 1 Action A B does not succeed if x(a) = 0 Boolean function f t for t f t : {0, 1} B {0, 1} associates a Boolean value f t (x) {0, 1} with each vector x {0, 1} B x is called an attack vector if f t (x) = 1
8 Attack defense Trees Barbara Kordy 8 ADTrees as Boolean Functions Domain of f t is composed of the non-refined nodes of t Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t
9 Attack defense Trees Barbara Kordy 9 Example: Boolean Function for Infecting a Computer infect computer virus on system execute virus with attachment USB stick antivirus install antivirus run antivirus f t = fake antivirus ( (X EA X US ) ( X IA (X RA X FA ) )) X EV
10 Attack defense Trees Barbara Kordy 10 Example: Attack Vector infect computer true virus on system true execute virus true with attachment true USB stick false antivirus false install antivirus true run antivirus false f t = fake antivirus false ( (X EA X US ) ( X IA (X RA X FA ) )) X EV attack vector
11 Attack defense Trees Barbara Kordy 11 Importance of Probabilities Knowing the probabilities of particular attacks allow us to Identify the most vulnerable components Determine the strategic points Decide which defensive measures to implement
12 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y
13 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy
14 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy
15 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy x(1 y)
16 Attack defense Trees Barbara Kordy 12 Bottom-Up Evaluation of Probability on ADTrees [ICISC 12] Probability of a disjunctive subtree Probability of a conjunctive subtree Probability of a countered subtree attack attack x x y x y y x + y xy xy x(1 y) Similarly for subtrees rooted in a defense node
17 Attack defense Trees Barbara Kordy 13 Example: Probability for Infecting a Computer infect computer virus on system execute virus 0.9 with attachment 0.5 USB stick 0.75 antivirus install antivirus 0.8 run antivirus 0.25 fake antivirus 0.25
18 Attack defense Trees Barbara Kordy 14 Limitations The bottom-up procedure does not take dependencies between actions into account. However, in practice Installing and running an antivirus Distributing and executing a virus are not independent actions. Thus, the standard bottom-up evaluation is not suitable for probabilistic assessment of attack defense trees.
19 Attack defense Trees Barbara Kordy 15 Challenges 1 How to design the appropriate formalism? 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?
20 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree
21 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree dependency model Bayesian network
22 Probabilistic Evaluation Barbara Kordy 16 Proposed Framework [ifm 14] security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
23 Probabilistic Evaluation Barbara Kordy 17 Modeling Probability of Dependent Actions Bayesian network A directed, acyclic graph that reflects the conditional interdependencies between variables associated with the nodes of the network Dependent variables Conditional probability table for Y X Y p(y = 1 X = 1) = 0.7 p(y = 1 X = 0) = 0.2 p(y = 0 X = 1) = 0.3 p(y = 0 X = 0) = 0.8
24 Probabilistic Evaluation Barbara Kordy 18 Constructing Bayesian Network BN t for ADTree t From an ADTree t ADTree B set of all non-refined nodes of t To a Bayesian network Elements of B are nodes of the Bayesian network BN t Relations between actions are depicted by edges in BN t Conditional probability tables quantify dependencies between actions
25 Probabilistic Evaluation Barbara Kordy 19 Example: BN t for Infecting a Computer ADTree p(x EA = 1 X FA = 1) = 0.9 p(x EA = 1 X FA = 0) = 0.5 with attachment p(x FA = 1) = 0.3 fake antivirus USB stick p(x US = 1 X FA = 1) = 0.4 p(x US = 1 X FA = 0) = 0.5 execute virus p(x EV = 1 X EA = 1, X US = 1) = 0.9 p(x EV = 1 X EA = 1, X US = 0) = 0.2 p(x EV = 1 X EA = 0, X US = 1) = 0.8 p(x EV = 1 X EA = 0, X US = 0) = 0.1 install antivirus run antivirus p(x IA = 1) = 0.6 p(x RA = 1 X IA = 1) = 0.9 p(x RA = 1 X IA = 0) = 0.0
26 Probabilistic Evaluation Barbara Kordy 20 Joint Probability Distribution for the Network BN t with attachment fake antivirus execute virus USB stick install antivirus run antivirus p(x EA, X US, X IA, X RA, X FA, X EV ) = p(x EV X EA, X US ) p(x EA X FA ) p(x US X FA ) p(x FA ) p(x RA X IA ) p(x IA )
27 Probabilistic Evaluation Barbara Kordy 21 Propositional Semantics Using Algebraic Operations Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t
28 Probabilistic Evaluation Barbara Kordy 21 Propositional Semantics Using Algebraic Operations Non-refined OR AND Countermeasure t t t' A t' t'' t' t'' t'' f t (A) = A f t = f t f t f t = f t f t f t = f t f t id A max{f t, f t } f t f t f t (1 f t )
29 Probabilistic Evaluation Barbara Kordy 22 Probability Computation x {0, 1} B vector of successful/unsuccessful actions Probability of attack vector x f t (x) p(x) Probability related to ADTree t P(t) = x {0,1} B f t (x) p(x) Probability of the most probable attack vector P max (t) = max f t(x) p(x) x {0,1} B
30 Probabilistic Evaluation Barbara Kordy 23 Compatibility Results [ifm 14] Theorem Probability computations on propositionally equivalent ADTrees yield the same result. Observation For ADTree t without dependent actions, P(t) coincides with the result of the bottom-up computation.
31 Efficiency Considerations Barbara Kordy 24 Efficiency Problems P(t) = x {0,1} B f t (x) p(x) P max (t) = max x {0,1} B f t(x) p(x) The number of configurations x grows exponentially with the number of involved actions. For large systems, it is therefore not feasible to Enumerate all the values of f t Enumerate all the values of the joint probability distribution for BN t
32 Efficiency Considerations Barbara Kordy 25 security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
33 Efficiency Considerations Barbara Kordy 25 security model ADTree constraint reasoning fusion dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
34 Efficiency Considerations Barbara Kordy 26 Local Indicators ( ( )) f t = (X EA X US ) XIA (X }{{} RA X FA ) X }{{} EV Y 1 Y }{{ 2 } }{{} Y 4 } {{ } Y t Y 3 φ 1 (Y 1, X EA, X US ) = 1 exactly if Y 1 = max{x EA, X US } φ 2 (Y 2, X RA, X FA ) = 1 exactly if Y 2 = X RA (1 X FA ) φ 3 (Y 3, X IA, Y 2 ) = 1 exactly if Y 3 = X IA Y 2 φ 4 (Y 4, Y 1, Y 3 ) = 1 exactly if Y 4 = Y 1 (1 Y 3 ) φ 5 (Y t, Y 4, X EV ) = 1 exactly if Y t = Y 4 X EV
35 Efficiency Considerations Barbara Kordy 27 Global indicator function φ t for ADTree t Domain of φ t : Non-refined nodes of t Inner variables of all local indicators Global indicator function φ t = product of all local indicators φ i Y=inner variables B=non-refined nodes {}}{{}}{ φ t ( Y 1, Y 2, Y 3, Y 4, Y t, X EA, X US, X IA, X RA, X FA, X EV ) = φ 1 (Y 1, X EA, X US ) φ 2 (Y 2, X RA, X FA ) φ 3 (Y 3, X IA, Y 2 ) φ 4 (Y 4, Y 1, Y 3 ) φ 5 (Y t, Y 4, X EV ) Φ t indicates valid assignments with respect to f t
36 Efficiency Considerations Barbara Kordy 28 Important Property Theorem Consider an ADTree t over the set of non-refined nodes B and the global indicator function φ t with the set of inner variables Y. x {0, 1} B!y {0, 1} Y, such that φ t (y, x) = 1 Corollary: x {0, 1} B max φ t(y, x) = y {0,1} Y y {0,1} Y φ t (y, x) = 1
37 Efficiency Considerations Barbara Kordy 29 Filtering Interesting Assignments of φ t A t B φ t (Y t = 1, X A = 1, X B = 1) = 1 φ t (Y t = 1, X A = 1, X B = 0) = 1 φ t (Y t = 1, X A = 0, X B = 1) = 1 φ t (Y t = 0, X A = 0, X B = 0) = 1 We are only interested in assignments such that φ t = 1 and Y t = 1 Y t φ t (y, x)
38 Efficiency Considerations Barbara Kordy 30 Expressing f t with its Global Indicator x {0, 1} B : max φ t(y, x) = y {0,1} Y y {0,1} Y φ t (y, x) = 1 x {0, 1} B ( max Yt φ t (y, x) ) = y {0,1} Y y {0,1} Y = f t (x) = ( Yt φ t (y, x) ) = { 1, if x is an attack vector 0, otherwise
39 Efficiency Considerations Barbara Kordy 31 Factorized Form for Probability Formulas Probability of attack vector x ( ) f t (x) p(x) = max Y t φ t (y, x) p(x) y {0,1} Y Probability related to ADTree t P(t) = x {0,1} B f t (x) p(x) = (y,x) {0,1} Y B ( ) Y t φ t (y, x) p(x) Probability of the most probable attack vector P max (t) = ( ) max f t(x) p(x) = max Y t φ t (y, x) p(x) x {0,1} B (y,x) {0,1} Y B
40 Efficiency Considerations Barbara Kordy 32 Our Framework in the Context of Semiring Theory Inference problem over the arithmetic semiring R, +, ( ) P(t) = Y t φ t (y, x) p(x) (y,x) {0,1} Y B Inference problem over the product t-norm semiring [0, 1], max, ( ) P max (t) = max Y t φ t (y, x) p(x) (y,x) {0,1} Y B
41 Efficiency Considerations Barbara Kordy 33 Local Computation Powerful local computation algorithms } Fusion smart distributivity Variable elimination P(t) Complexity bound Using Nenok tool [IJAIT 10] Direct computation sec Using fusion sec Complexity bounded by a structural parameter of the problem
42 Summary Wrap Up
43 Wrap Up Barbara Kordy 34 Summary security model ADTree
44 Wrap Up Barbara Kordy 34 Summary security model ADTree dependency model Bayesian network
45 Wrap Up Barbara Kordy 34 Summary security model ADTree dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
46 Wrap Up Barbara Kordy 34 Summary security model ADTree constraint reasoning fusion dependency model Bayesian network probabilistic assessment of attack defense scenarios with dependencies
47 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?
48 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? 3 How to guarantee the efficiency of the evaluation?
49 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? Real-life data take dependencies into account Complement ADTree with additional information 3 How to guarantee the efficiency of the evaluation?
50 Wrap Up Barbara Kordy 35 Addressing Challenges 1 How to design the appropriate formalism? Used by industry, intuitive & well formalized Security model and dependency network are kept separated 2 How to ensure that calculations reflect the reality? Real-life data take dependencies into account Complement ADTree with additional information 3 How to guarantee the efficiency of the evaluation? Local computation algorithms Existing software tools, well-known heuristics
51 Wrap Up Barbara Kordy 36 Where to take it from here? Find the best elimination sequence for Bayesian ADTrees NP-complete in general Prediction is possible for specific families of graphs Extend to probability distributions Probability dependent on time Interface ADTool [QEST 13] with Nenok Automated probability assessment of large scale scenarios
52 Thank you for your attention! Barbara Kordy 37 Follow Up Project Attack Defense Trees: Theory Meets Practice Ph.D. vacancy: Contact information: Barbara Kordy
53 References Barbara Kordy 38 References I Bruce Schneier. Attack Trees. Dr. Dobb s Journal of Software Tools, 24(12):21 29, Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. In Tansu Alpcan, Levente Buttyán, and John S. Baras, editors, Decision and Game Theory for Security (GameSec 2010), volume 6442 of LNCS, pages Springer, Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Foundations of Attack Defense Trees. In Pierpaolo Degano, Sandro Etalle, and Joshua Guttman, editors, Formal Aspects of Security and Trust (FAST 2010), volume 6561 of LNCS, pages Springer, Marc Pouly. Nenok - a software architecture for generic inference. International Journal on Artificial Intelligence Tools, 19(1):65 99, 2010.
54 References Barbara Kordy 39 References II Barbara Kordy, Marc Pouly, and Patrick Schweitzer. Computational Aspects of Attack Defense Trees. In P. Bouvry, M. A. Klopotek, F. Leprevost, M. Marciniak, A. Mykowiecka, and H. Rybinski, editors, Security & Intelligent Information Systems (SIIS 2011), volume 7053 of LNCS, pages Springer, Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. Attack Defense Trees. Journal of Logic and Computation (JLC), 24(1):55 87, Barbara Kordy, Piotr Kordy, Sjouke Mauw, and Patrick Schweitzer. ADTool: Security Analysis with Attack Defense Trees. In Kaustubh R. Joshi, Markus Siegle, Mariëlle Stoelinga, and Pedro R. D Argenio, editors, Quantitative Evaluation of Systems (QEST 2013), volume 8054 of LNCS, pages Springer, Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, and Patrick Schweitzer. Attribute Decoration of Attack Defense Trees. International Journal of Secure Software Engineering (IJSSE), 3(2):1 35, [IGI Global s 2012 Best Article Award].
55 References Barbara Kordy 40 References III Barbara Kordy, Sjouke Mauw, and Patrick Schweitzer. Quantitative Questions on Attack Defense Trees. In Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon, editors, Information Security and Cryptology (ICISC 2012), volume 7839 of LNCS, pages Springer, Barbara Kordy, Marc Pouly, and Patrick Schweitzer. A Probabilistic Framework for Security Scenarios with Dependent Actions Under review. Barbara Kordy, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. DAG-Based Attack and Defense Modeling: Don t Miss the Forest for the Attack Trees Under submission, pre-print available at
A Probabilistic Framework for Security Scenarios with Dependent Actions
A Probabilistic Framework for Security Scenarios with Dependent Actions Barbara Kordy 1,2, Marc Pouly 3, Patrick Schweitzer 1 1 University of Luxembourg, SnT, Luxembourg 2 INSA/IRISA, Rennes, France barbara.kordy,patrick.schweitzer@uni.lu
More informationProbabilistic Reasoning with Graphical Security Models
Probabilistic Reasoning with Graphical Security Models Barbara Kordy a,b,, Marc Pouly c, Patrick Schweitzer b a INSA Rennes, IRISA, France b University of Luxembourg, SnT, Luxembourg c Lucerne University
More informationA Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project
More informationarxiv: v1 [cs.cr] 8 Mar 2015
Attack Trees with Sequential Conjunction Ravi Jhawar 1, Barbara Kordy 2, Sjouke Mauw 1, Saša Radomirović 3, Rolando Trujillo-Rasua 1 arxiv:1503.02261v1 [cs.cr] 8 Mar 2015 1 University of Luxembourg, SnT,
More informationQuantifying uncertainty & Bayesian networks
Quantifying uncertainty & Bayesian networks CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, 3 rd Edition,
More informationA brief introduction to Logic. (slides from
A brief introduction to Logic (slides from http://www.decision-procedures.org/) 1 A Brief Introduction to Logic - Outline Propositional Logic :Syntax Propositional Logic :Semantics Satisfiability and validity
More informationQuantitative Verification and Synthesis of Attack-Defence Scenarios
Quantitative Verification and Synthesis of Attack-Defence Scenarios Zaruhi Aslanyan, Flemming Nielson DTU Compute Technical University of Denmark Denmark Email: {zaas,fnie}@dtu.dk David Parker School of
More informationarxiv: v1 [cs.lo] 21 Jan 2018
An Intuitionistic Linear Logical Semantics of SAND Attack Trees Harley Eades III arxiv:1801.06886v1 [cs.lo] 21 Jan 2018 Computer Science Augusta University harley.eades@gmail.com Abstract. In this paper
More informationBayes Nets: Independence
Bayes Nets: Independence [These slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials are available at http://ai.berkeley.edu.] Bayes Nets A Bayes
More informationCS 5522: Artificial Intelligence II
CS 5522: Artificial Intelligence II Bayes Nets: Independence Instructor: Alan Ritter Ohio State University [These slides were adapted from CS188 Intro to AI at UC Berkeley. All materials available at http://ai.berkeley.edu.]
More informationBayesian Networks BY: MOHAMAD ALSABBAGH
Bayesian Networks BY: MOHAMAD ALSABBAGH Outlines Introduction Bayes Rule Bayesian Networks (BN) Representation Size of a Bayesian Network Inference via BN BN Learning Dynamic BN Introduction Conditional
More informationIntroduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010
Introduction to Artificial Intelligence Propositional Logic & SAT Solving UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Today Representation in Propositional Logic Semantics & Deduction
More informationUncertainty and Bayesian Networks
Uncertainty and Bayesian Networks Tutorial 3 Tutorial 3 1 Outline Uncertainty Probability Syntax and Semantics for Uncertainty Inference Independence and Bayes Rule Syntax and Semantics for Bayesian Networks
More informationArtificial Intelligence Bayes Nets: Independence
Artificial Intelligence Bayes Nets: Independence Instructors: David Suter and Qince Li Course Delivered @ Harbin Institute of Technology [Many slides adapted from those created by Dan Klein and Pieter
More informationAndrew/CS ID: Midterm Solutions, Fall 2006
Name: Andrew/CS ID: 15-780 Midterm Solutions, Fall 2006 November 15, 2006 Place your name and your andrew/cs email address on the front page. The exam is open-book, open-notes, no electronics other than
More informationCh.6 Uncertain Knowledge. Logic and Uncertainty. Representation. One problem with logical approaches: Department of Computer Science
Ch.6 Uncertain Knowledge Representation Hantao Zhang http://www.cs.uiowa.edu/ hzhang/c145 The University of Iowa Department of Computer Science Artificial Intelligence p.1/39 Logic and Uncertainty One
More informationBasing Decisions on Sentences in Decision Diagrams
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu
More informationCS Lecture 3. More Bayesian Networks
CS 6347 Lecture 3 More Bayesian Networks Recap Last time: Complexity challenges Representing distributions Computing probabilities/doing inference Introduction to Bayesian networks Today: D-separation,
More informationReasoning with Quantified Boolean Formulas
Reasoning with Quantified Boolean Formulas Martina Seidl Institute for Formal Models and Verification Johannes Kepler University Linz 1 What are QBF? Quantified Boolean formulas (QBF) are formulas of propositional
More informationSemirings for Breakfast
Semirings for Breakfast Marc Pouly marc.pouly@unifr.ch Interdisciplinary Center for Security, Reliability and Trust University of Luxembourg July 2010 Marc Pouly Semirings for Breakfast 1/ 27 Semirings
More informationSymbolic Variable Elimination in Discrete and Continuous Graphical Models. Scott Sanner Ehsan Abbasnejad
Symbolic Variable Elimination in Discrete and Continuous Graphical Models Scott Sanner Ehsan Abbasnejad Inference for Dynamic Tracking No one previously did this inference exactly in closed-form! Exact
More informationCS 188: Artificial Intelligence Spring Announcements
CS 188: Artificial Intelligence Spring 2011 Lecture 16: Bayes Nets IV Inference 3/28/2011 Pieter Abbeel UC Berkeley Many slides over this course adapted from Dan Klein, Stuart Russell, Andrew Moore Announcements
More informationPrice: $25 (incl. T-Shirt, morning tea and lunch) Visit:
Three days of interesting talks & workshops from industry experts across Australia Explore new computing topics Network with students & employers in Brisbane Price: $25 (incl. T-Shirt, morning tea and
More informationPROBABILISTIC REASONING SYSTEMS
PROBABILISTIC REASONING SYSTEMS In which we explain how to build reasoning systems that use network models to reason with uncertainty according to the laws of probability theory. Outline Knowledge in uncertain
More informationDirected Graphical Models or Bayesian Networks
Directed Graphical Models or Bayesian Networks Le Song Machine Learning II: Advanced Topics CSE 8803ML, Spring 2012 Bayesian Networks One of the most exciting recent advancements in statistical AI Compact
More informationEE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS
EE562 ARTIFICIAL INTELLIGENCE FOR ENGINEERS Lecture 16, 6/1/2005 University of Washington, Department of Electrical Engineering Spring 2005 Instructor: Professor Jeff A. Bilmes Uncertainty & Bayesian Networks
More informationComputational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)
Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural
More informationCS 188: Artificial Intelligence. Bayes Nets
CS 188: Artificial Intelligence Probabilistic Inference: Enumeration, Variable Elimination, Sampling Pieter Abbeel UC Berkeley Many slides over this course adapted from Dan Klein, Stuart Russell, Andrew
More informationBayesian Networks Inference with Probabilistic Graphical Models
4190.408 2016-Spring Bayesian Networks Inference with Probabilistic Graphical Models Byoung-Tak Zhang intelligence Lab Seoul National University 4190.408 Artificial (2016-Spring) 1 Machine Learning? Learning
More information3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.
1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is
More informationInterleaved Alldifferent Constraints: CSP vs. SAT Approaches
Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université
More informationBayesian networks. Chapter Chapter
Bayesian networks Chapter 14.1 3 Chapter 14.1 3 1 Outline Syntax Semantics Parameterized distributions Chapter 14.1 3 2 Bayesian networks A simple, graphical notation for conditional independence assertions
More informationThe Bayesian Ontology Language BEL
Journal of Automated Reasoning manuscript No. (will be inserted by the editor) The Bayesian Ontology Language BEL İsmail İlkan Ceylan Rafael Peñaloza Received: date / Accepted: date Abstract We introduce
More informationValidating QBF Invalidity in HOL4
Interactive Theorem Proving (ITP) 14 July, 2010 Quantified Boolean Formulae Quantified Boolean Formulae Motivation System Overview Related Work QBF = propositional logic + quantifiers over Boolean variables
More informationProbabilistic Reasoning. (Mostly using Bayesian Networks)
Probabilistic Reasoning (Mostly using Bayesian Networks) Introduction: Why probabilistic reasoning? The world is not deterministic. (Usually because information is limited.) Ways of coping with uncertainty
More informationComp487/587 - Boolean Formulas
Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested
More informationUncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes
Approximate reasoning Uncertainty and knowledge Introduction All knowledge representation formalism and problem solving mechanisms that we have seen until now are based on the following assumptions: All
More informationCOS402- Artificial Intelligence Fall Lecture 10: Bayesian Networks & Exact Inference
COS402- Artificial Intelligence Fall 2015 Lecture 10: Bayesian Networks & Exact Inference Outline Logical inference and probabilistic inference Independence and conditional independence Bayes Nets Semantics
More informationIntroduction Models of Attack Trees Computational Semantics. Attack Trees. Models and Computation. Jan Willemson, Aivo Jürgenson, Margus Niitsoo
Attack Trees Models and Computation Jan Willemson, Aivo Jürgenson, Margus Niitsoo Cybernetica, Estonia http://www.cybernetica.eu/ January 19th, 2010 University of Luxembourg We will use the basic multi-parameter
More informationFIRST-ORDER QUERY EVALUATION ON STRUCTURES OF BOUNDED DEGREE
FIRST-ORDER QUERY EVALUATION ON STRUCTURES OF BOUNDED DEGREE INRIA and ENS Cachan e-mail address: kazana@lsv.ens-cachan.fr WOJCIECH KAZANA AND LUC SEGOUFIN INRIA and ENS Cachan e-mail address: see http://pages.saclay.inria.fr/luc.segoufin/
More informationHandbook of Logic and Proof Techniques for Computer Science
Steven G. Krantz Handbook of Logic and Proof Techniques for Computer Science With 16 Figures BIRKHAUSER SPRINGER BOSTON * NEW YORK Preface xvii 1 Notation and First-Order Logic 1 1.1 The Use of Connectives
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More information1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT
1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations
More informationA Resolution Method for Modal Logic S5
EPiC Series in Computer Science Volume 36, 2015, Pages 252 262 GCAI 2015. Global Conference on Artificial Intelligence A Resolution Method for Modal Logic S5 Yakoub Salhi and Michael Sioutis Université
More informationDecision Procedures for Satisfiability and Validity in Propositional Logic
Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm
More informationProbabilistic Graphical Models and Bayesian Networks. Artificial Intelligence Bert Huang Virginia Tech
Probabilistic Graphical Models and Bayesian Networks Artificial Intelligence Bert Huang Virginia Tech Concept Map for Segment Probabilistic Graphical Models Probabilistic Time Series Models Particle Filters
More informationProduct rule. Chain rule
Probability Recap CS 188: Artificial Intelligence ayes Nets: Independence Conditional probability Product rule Chain rule, independent if and only if: and are conditionally independent given if and only
More informationOverview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits
More informationQuantifying Uncertainty & Probabilistic Reasoning. Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari
Quantifying Uncertainty & Probabilistic Reasoning Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari Outline Previous Implementations What is Uncertainty? Acting Under Uncertainty Rational Decisions Basic
More informationKnowledge base (KB) = set of sentences in a formal language Declarative approach to building an agent (or other system):
Logic Knowledge-based agents Inference engine Knowledge base Domain-independent algorithms Domain-specific content Knowledge base (KB) = set of sentences in a formal language Declarative approach to building
More informationY. Xiang, Inference with Uncertain Knowledge 1
Inference with Uncertain Knowledge Objectives Why must agent use uncertain knowledge? Fundamentals of Bayesian probability Inference with full joint distributions Inference with Bayes rule Bayesian networks
More informationPropositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel
Propositional Logic Testing, Quality Assurance, and Maintenance Winter 2018 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More information2 : Directed GMs: Bayesian Networks
10-708: Probabilistic Graphical Models, Spring 2015 2 : Directed GMs: Bayesian Networks Lecturer: Eric P. Xing Scribes: Yi Cheng, Cong Lu 1 Notation Here the notations used in this course are defined:
More informationNotes. Corneliu Popeea. May 3, 2013
Notes Corneliu Popeea May 3, 2013 1 Propositional logic Syntax We rely on a set of atomic propositions, AP, containing atoms like p, q. A propositional logic formula φ Formula is then defined by the following
More informationLogic: The Big Picture
Logic: The Big Picture A typical logic is described in terms of syntax: what are the legitimate formulas semantics: under what circumstances is a formula true proof theory/ axiomatization: rules for proving
More informationApplying Bayesian networks in the game of Minesweeper
Applying Bayesian networks in the game of Minesweeper Marta Vomlelová Faculty of Mathematics and Physics Charles University in Prague http://kti.mff.cuni.cz/~marta/ Jiří Vomlel Institute of Information
More informationGuided design of attack trees: a system-based approach
Guided design of attack trees: a system-based approach Maxime Audinot, Sophie Pinchinat Univ Rennes, CNRS, IRISA, Rennes, France {maxime.audinot, sophie.pinchinat}@irisa.fr Barbara Kordy Univ Rennes, INSA
More informationComputational Complexity of Inference
Computational Complexity of Inference Sargur srihari@cedar.buffalo.edu 1 Topics 1. What is Inference? 2. Complexity Classes 3. Exact Inference 1. Variable Elimination Sum-Product Algorithm 2. Factor Graphs
More informationAlternating nonzero automata
Alternating nonzero automata Application to the satisfiability of CTL [,, P >0, P =1 ] Hugo Gimbert, joint work with Paulin Fournier LaBRI, Université de Bordeaux ANR Stoch-MC 06/07/2017 Control and verification
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Fall 2015 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
More informationBayesian Networks. Marcello Cirillo PhD Student 11 th of May, 2007
Bayesian Networks Marcello Cirillo PhD Student 11 th of May, 2007 Outline General Overview Full Joint Distributions Bayes' Rule Bayesian Network An Example Network Everything has a cost Learning with Bayesian
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationBinary Decision Diagrams. Graphs. Boolean Functions
Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant
More informationIncomplete version for students of easllc2012 only. 6.6 The Model Existence Game 99
98 First-Order Logic 6.6 The Model Existence Game In this section we learn a new game associated with trying to construct a model for a sentence or a set of sentences. This is of fundamental importance
More informationReduced Ordered Binary Decision Diagrams
Reduced Ordered Binary Decision Diagrams Lecture #12 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 13, 2016 c JPK
More informationOn the Soundness of Attack Trees
On the oundness of Attack Trees Maxime Audinot and ophie Pinchinat IRIA, Campus de Beaulieu, 35042 Rennes Cedex, FRANCE. E-mails:{maxime.audinot,sophie.pinchinat}@irisa.fr Abstract. We formally define
More informationBayesian Networks. instructor: Matteo Pozzi. x 1. x 2. x 3 x 4. x 5. x 6. x 7. x 8. x 9. Lec : Urban Systems Modeling
12735: Urban Systems Modeling Lec. 09 Bayesian Networks instructor: Matteo Pozzi x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 1 outline example of applications how to shape a problem as a BN complexity of the inference
More informationFirst-Order Logic. Chapter Overview Syntax
Chapter 10 First-Order Logic 10.1 Overview First-Order Logic is the calculus one usually has in mind when using the word logic. It is expressive enough for all of mathematics, except for those concepts
More informationModel Checking for Propositions CS477 Formal Software Dev Methods
S477 Formal Software Dev Methods Elsa L Gunter 2112 S, UIU egunter@illinois.edu http://courses.engr.illinois.edu/cs477 Slides based in part on previous lectures by Mahesh Vishwanathan, and by Gul gha January
More informationCS1021. Why logic? Logic about inference or argument. Start from assumptions or axioms. Make deductions according to rules of reasoning.
3: Logic Why logic? Logic about inference or argument Start from assumptions or axioms Make deductions according to rules of reasoning Logic 3-1 Why logic? (continued) If I don t buy a lottery ticket on
More informationECE521 Lecture7. Logistic Regression
ECE521 Lecture7 Logistic Regression Outline Review of decision theory Logistic regression A single neuron Multi-class classification 2 Outline Decision theory is conceptually easy and computationally hard
More informationBayesian Network. Outline. Bayesian Network. Syntax Semantics Exact inference by enumeration Exact inference by variable elimination
Outline Syntax Semantics Exact inference by enumeration Exact inference by variable elimination s A simple, graphical notation for conditional independence assertions and hence for compact specication
More informationTitle: Logical Agents AIMA: Chapter 7 (Sections 7.4 and 7.5)
B.Y. Choueiry 1 Instructor s notes #12 Title: Logical Agents AIMA: Chapter 7 (Sections 7.4 and 7.5) Introduction to Artificial Intelligence CSCE 476-876, Fall 2018 URL: www.cse.unl.edu/ choueiry/f18-476-876
More informationArithmetic circuits of the noisy-or models
Arithmetic circuits of the noisy-or models Jiří Vomlel Institute of Information Theory and Automation of the ASCR Academy of Sciences of the Czech Republic Pod vodárenskou věží 4, 182 08 Praha 8. Czech
More informationCVO103: Programming Languages. Lecture 2 Inductive Definitions (2)
CVO103: Programming Languages Lecture 2 Inductive Definitions (2) Hakjoo Oh 2018 Spring Hakjoo Oh CVO103 2018 Spring, Lecture 2 March 13, 2018 1 / 20 Contents More examples of inductive definitions natural
More informationPropositional Logic. Methods & Tools for Software Engineering (MTSE) Fall Prof. Arie Gurfinkel
Propositional Logic Methods & Tools for Software Engineering (MTSE) Fall 2017 Prof. Arie Gurfinkel References Chpater 1 of Logic for Computer Scientists http://www.springerlink.com/content/978-0-8176-4762-9/
More informationBayesian Networks. Motivation
Bayesian Networks Computer Sciences 760 Spring 2014 http://pages.cs.wisc.edu/~dpage/cs760/ Motivation Assume we have five Boolean variables,,,, The joint probability is,,,, How many state configurations
More informationFirst-order resolution for CTL
First-order resolution for Lan Zhang, Ullrich Hustadt and Clare Dixon Department of Computer Science, University of Liverpool Liverpool, L69 3BX, UK {Lan.Zhang, U.Hustadt, CLDixon}@liverpool.ac.uk Abstract
More informationAnnouncements. CS 188: Artificial Intelligence Spring Bayes Net Semantics. Probabilities in BNs. All Conditional Independences
CS 188: Artificial Intelligence Spring 2011 Announcements Assignments W4 out today --- this is your last written!! Any assignments you have not picked up yet In bin in 283 Soda [same room as for submission
More informationCOMPSCI 276 Fall 2007
Exact Inference lgorithms for Probabilistic Reasoning; OMPSI 276 Fall 2007 1 elief Updating Smoking lung ancer ronchitis X-ray Dyspnoea P lung cancer=yes smoking=no, dyspnoea=yes =? 2 Probabilistic Inference
More informationBayesian Networks Factor Graphs the Case-Factor Algorithm and the Junction Tree Algorithm
Bayesian Networks Factor Graphs the Case-Factor Algorithm and the Junction Tree Algorithm 1 Bayesian Networks We will use capital letters for random variables and lower case letters for values of those
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationCOMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati"
COMP3702/7702 Artificial Intelligence Week 5: Search in Continuous Space with an Application in Motion Planning " Hanna Kurniawati" Last week" Main components of PRM" Collision check for a configuration"
More informationMATHEMATICAL ENGINEERING TECHNICAL REPORTS. Deductive Inference for the Interiors and Exteriors of Horn Theories
MATHEMATICAL ENGINEERING TECHNICAL REPORTS Deductive Inference for the Interiors and Exteriors of Horn Theories Kazuhisa MAKINO and Hirotaka ONO METR 2007 06 February 2007 DEPARTMENT OF MATHEMATICAL INFORMATICS
More informationClause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas
Journal of Artificial Intelligence Research 1 (1993) 1-15 Submitted 6/91; published 9/91 Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Enrico Giunchiglia Massimo
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationData Structures for Efficient Inference and Optimization
Data Structures for Efficient Inference and Optimization in Expressive Continuous Domains Scott Sanner Ehsan Abbasnejad Zahra Zamani Karina Valdivia Delgado Leliane Nunes de Barros Cheng Fang Discrete
More informationUncertainty. Logic and Uncertainty. Russell & Norvig. Readings: Chapter 13. One problem with logical-agent approaches: C:145 Artificial
C:145 Artificial Intelligence@ Uncertainty Readings: Chapter 13 Russell & Norvig. Artificial Intelligence p.1/43 Logic and Uncertainty One problem with logical-agent approaches: Agents almost never have
More informationCompiling Knowledge into Decomposable Negation Normal Form
Compiling Knowledge into Decomposable Negation Normal Form Adnan Darwiche Cognitive Systems Laboratory Department of Computer Science University of California Los Angeles, CA 90024 darwiche@cs. ucla. edu
More informationIntroduction to Artificial Intelligence. Unit # 11
Introduction to Artificial Intelligence Unit # 11 1 Course Outline Overview of Artificial Intelligence State Space Representation Search Techniques Machine Learning Logic Probabilistic Reasoning/Bayesian
More informationTowards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence
Towards Inference and Learning in Dynamic Bayesian Networks using Generalized Evidence Christopher James Langmead August 2008 CMU-CS-08-151 School of Computer Science Carnegie Mellon University Pittsburgh,
More informationA Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver
A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver J.C. Madre and O. Coudert Bull Corporate Research Center Rue Jean Jaurès 78340 Les Clayes-sous-bois FRANCE Abstract
More informationcse 311: foundations of computing Fall 2015 Lecture 6: Predicate Logic, Logical Inference
cse 311: foundations of computing Fall 2015 Lecture 6: Predicate Logic, Logical Inference quantifiers x P(x) P(x) is true for every x in the domain read as for all x, P of x x P x There is an x in the
More informationBayesian Networks. Vibhav Gogate The University of Texas at Dallas
Bayesian Networks Vibhav Gogate The University of Texas at Dallas Intro to AI (CS 6364) Many slides over the course adapted from either Dan Klein, Luke Zettlemoyer, Stuart Russell or Andrew Moore 1 Outline
More informationElementary Loops Revisited
Elementary Loops Revisited Jianmin Ji a, Hai Wan b, Peng Xiao b, Ziwei Huo b, and Zhanhao Xiao c a School of Computer Science and Technology, University of Science and Technology of China, Hefei, China
More informationLogic. Introduction to Artificial Intelligence CS/ECE 348 Lecture 11 September 27, 2001
Logic Introduction to Artificial Intelligence CS/ECE 348 Lecture 11 September 27, 2001 Last Lecture Games Cont. α-β pruning Outline Games with chance, e.g. Backgammon Logical Agents and thewumpus World
More informationProbabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference
Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference David Poole University of British Columbia 1 Overview Belief Networks Variable Elimination Algorithm Parent Contexts
More informationUsing first-order logic, formalize the following knowledge:
Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the
More information