Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Heuristic Search techniques
Linear Time Methods for Propagating Beliefs Min Convolution, Distance Transforms and Box Sums Daniel Huttenlocher Computer Science Department December,
5.1 Real Vector Spaces.
Optimizing Join Enumeration in Transformation-based Query Optimizers ANIL SHANBHAG, S. SUDARSHAN IIT BOMBAY VLDB 2014
Fast Algorithms For Hierarchical Range Histogram Constructions
Study Group Randomized Algorithms 21 st June 03. Topics Covered Game Tree Evaluation –its expected run time is better than the worst- case complexity.
Techniques for Dealing with Hard Problems Backtrack: –Systematically enumerates all potential solutions by continually trying to extend a partial solution.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Part 3: The Minimax Theorem
Computing Optimal Randomized Resource Allocations for Massive Security Games Presenter : Jen Hua Chi Advisor : Yeong Sung Lin.
Structural Reliability Analysis – Basics
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Chapter 12: Expert Systems Design Examples
Hidden Markov Models M. Vijay Venkatesh. Outline Introduction Graphical Model Parameterization Inference Summary.
Planning under Uncertainty
Query Evaluation. An SQL query and its RA equiv. Employees (sin INT, ename VARCHAR(20), rating INT, age REAL) Maintenances (sin INT, planeId INT, day.
Oblivious Routing for the L p -norm Matthias Englert Harald Räcke 1.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Evolutionary Games The solution concepts that we have discussed in some detail include strategically dominant solutions equilibrium solutions Pareto optimal.
Gene Regulatory Networks - the Boolean Approach Andrey Zhdanov Based on the papers by Tatsuya Akutsu et al and others.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
16.5 Introduction to Cost- based plan selection Amith KC Student Id: 109.
Distributed Constraint Optimization * some slides courtesy of P. Modi
Super-Resolution of Remotely-Sensed Images Using a Learning-Based Approach Isabelle Bégin and Frank P. Ferrie Abstract Super-resolution addresses the problem.
Models of Influence in Online Social Networks
Chapter 5 Sampling Distributions
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
A Markov Random Field Model for Term Dependencies Donald Metzler W. Bruce Croft Present by Chia-Hao Lee.
CPS LP and IP in Game theory (Normal-form Games, Nash Equilibria and Stackelberg Games) Joshua Letchford.
1 Lesson 8: Basic Monte Carlo integration We begin the 2 nd phase of our course: Study of general mathematics of MC We begin the 2 nd phase of our course:
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
Minimax with Alpha Beta Pruning The minimax algorithm is a way of finding an optimal move in a two player game. Alpha-beta pruning is a way of finding.
Discrete Structures Lecture 12: Trees Ji Yanyan United International College Thanks to Professor Michael Hvidsten.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Graph-based Text Classification: Learn from Your Neighbors Ralitsa Angelova , Gerhard Weikum : Max Planck Institute for Informatics Stuhlsatzenhausweg.
Micro-Simulation of Diffusion of Warnings Cindy Hui Mark Goldberg Malik Magdon-Ismail William A. Wallace Rensselaer Polytechnic Institute This material.
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Online Social Networks and Media
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Bushy Binary Search Tree from Ordered List. Behavior of the Algorithm Binary Search Tree Recall that tree_search is based closely on binary search. If.
MBF1413 | Quantitative Methods Prepared by Dr Khairul Anuar 8: Time Series Analysis & Forecasting – Part 1
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Copyright © 2013, 2009, 2005 Pearson Education, Inc. 1 3 Polynomial and Rational Functions Copyright © 2013, 2009, 2005 Pearson Education, Inc.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
Hongyu Liang Institute for Theoretical Computer Science Tsinghua University, Beijing, China The Algorithmic Complexity.
Non-additive Security Games
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Hidden Markov Models Part 2: Algorithms
Introduction Wireless Ad-Hoc Network
Information Theoretical Analysis of Digital Watermarking
Optimal defence of single object with imperfect false targets
Presentation transcript:

Adviser: Frank,Yeong-Sung Lin Present by Chris Chang

 Introduction  Stackelberg Security Games  Computing Optimal Randomized Security Configurations  Incorporating Network Structure  Supply Chain Example  Experimental results  Conclusion

 Game theoretic approaches to security have received much attention in recent years.  The point of departure of this work is a different line of work that develops linear and integer programming methods for optimal randomized allocation of security resources among possible attack targets.

 In this work, the assumption is made that the defender is a Stackelberg leader, that is, he is able to commit to a randomized policy, which is subsequently observed by the attacker who optimally responds to it  In this paper we introduce a novel framework for computing optimal randomized security policies in networked domains

 A Stackelberg security game (Kiekintveld et al. 2009) consists of two players, the leader (defender) and the follower (attacker), and a set of possible targets.  The leader can decide upon a randomized policy of defending the targets, possibly with limited defense resources  commits to a mixed strategy  The follower (attacker) is assumed to observe the randomized policy of the leader, but not the realized defense actions.  Upon observing the leader’s strategy, the follower chooses a target so as to maximize its expected utility.

 In past work, Stackelberg security game formulations focused on defense policies that were costless, but resource bounded  We may choose among many security configurations for each valued asset, and, additionally, security resources are only available at some cost.

 To formalize, suppose that the defender can choose from a finite set O of security configurations for each target t ∈ T, with | T | = n.  c o,t : A configuration o ∈ O for target t ∈ T incurs a cost c o,t to the defender.  U o,t 、 V o,t : If the attacker happens to attack t while configuration o is in place, the expected value to the defender is denoted by U o,t, while the attacker’s value is V o,t.  q o.t : We denote by q o.t the probability that the defender chooses o at target t  a t : denotes the probability that the attacker attacks target t.

 We first show how to extend this MIP formulation to arbitrary security configurations, as well as to incorporate costs of such configurations.  Mixed Integer Programming Formulation:

 We then proceed to offer an alternative formulation involving multiple linear programs (in the same vein as the initial multiple-LP formulation for general Stackelberg games  Multiple-LP Formulation:

 some of the n LPs may actually be infeasible: some targets may not be optimal for the attacker for any defense policy.  Single Linear Program Formulation

 Notice that we can easily incorporate additional linear constraints in any of these formulations. For example, it is often useful to add a budget constraint:

 A key assumption has been that the utility of the defender and the attacker for each target depends only on the defense configuration for that target, as well as whether it is attacked or not.  In this section, we show how to transform certain classes of problems with interdependent assets into a formulation in which targets become effectively independent, for the purposes of our solution techniques.  w o,t (a): be an intrinsic worth of a target t to the defender when it is protected by a security configuration o and the attacker employs a probability vector.

 Suppose that the attacker chooses to attack a target t (and only t). Further, assume that the defender and attacker utilities are additive in target-specific worths.  The expected utility U o,t is then:

 Assumption 1 :  Example1 : Airline baggage screening  Example2 : Cybersecurity  Consequently, the expected utility U o,t is then:

 We offer a specific model of interdependence between targets  Suppose that dependencies between targets are represented by a graph (T, E), with T the set of targets (nodes) as above, and E the set of edges (t, t“), where an edge from t to t“

 z o,t : The security configuration determines the z o,t probability, that target t is compromised (affected) if the attacker attacks it directly and the defense configuration is o.  We model the interdependencies between the nodes as independent cascade contagion, which has previously been used primarily to model diffusion of product adoption and infectious disease

 The contagion proceeds starting at an attacked node t, affecting its network neighbors t“ each with probability p t,t’. The contagion can only occur once along any network edge, and once a node is affected, it stays affected through the diffusion process.  The simple way to conceive of this is to start with the network (T, E) and then remove each edge (t, t’) with probability (1 − p t,t ).  The entire connected component of an attacked node is then deemed affected.

 Given the independent cascade model of interdependencies between targets, we must compute expected utilities, U o,t and V o,t, of the defender and the attacker respectively.  In the special case when the network is a tree, however, we can show that expected utilities can be computed exactly in linear time.

◦ Theorem 1. Given an undirected tree (T, E), an assigned worth for each node (w t ), and a probability of spread over each edge p t,t’, we can calculate the expected utility at each target in O(n).  Let us define the neighbors of a target t as N t. By definition, the expected utility of a given node t (U o,t ) is the direct utility at that node (z o,t w t ) plus the expected utility due to the cascading failure.  The expected utility due to cascading failure is:

 we can express the expected utility of the contagion spreading across an edge (t, t’), E[U (t,t’) ], as:  Thus, we can reason that for each node t:

 A two-pass algorithm for calculating U t for all t : ◦ First, choose an arbitrary node to be the root of the tree. ◦ In the first pass, we calculate the expected loss due to each edge from child to parent from the bottom of the tree upward. ◦ In the second pass, we calculate the expected loss on each edge from parent to child from the top of the tree downward. ◦ We can model this as a message passing algorithm, where calculating E[U (t,t’) ] is done by passing a message from t" to t. W

 Consider the edges between a given node t and its neighbors. Unless t is the root, one of these edges will be between t and its parent P t, and the rest will be between t and its children.  Since In the first pass we are passing messages from child to parent and a node has only one parent, we will have received messages from N t \ P t when we generate the message from t to P t.  For the second pass, when we pass information to a child of t, C t, we will have received messages from N t, thus we again have the necessary information to generate the message from t to C t. tptct

 Finally, once a node has received messages from all of its neighbors we can easily calculate the expected loss at each node by Equation 18.  By combining Equations 17 and 18 we can reason that E[U (t,t’) ] = p t,t’ (U t’ − E[U (t’,t) ]). This allows us to give an equivalent definition of U t :

 Consider a seven-node supply chain (directed acyclic graph) shown in Figure 2.

 The first step in our framework is to compute (or estimate) the expected utility for each node in the supply chain.  we first specify the probability that an attacked node is affected (in this case, becomes faulty), z o,t. We let z o,t = 1 when node t is not inspected and z o,t = 0 when it is.  We use p t,t = 0.5 for all edges here.

 The higher cost setting (left) yields a security configuration in which five of the seven nodes incur some probability of inspection, with the heavier colors corresponding to high inspection probability. The low-cost setting (right) yields a solution in which every node is defended with probability 1.

 In this section we apply our framework to 4 networked domains.  First, we consider networks generated from two major generative random graph models: 1.Erdos-Renyi and 2.Preferential Attachment  In addition, we explore two networks derived from real security settings: one that models 3.dependencies between critical infrastructure and key resource sectors, as inferred from the DHS and FEMA websites, and another that captures 4.payments between banks in the core of the Fedwire network.

 In this section we assume that the defender has two strategies at every target, one with a cost of 0 which stops attacks 0% of the time and one with a cost of c which prevents attacks 100% of the time, and, additionally, that we have a zero-sum game between the defender and attacker.

 Erdos-Renyi (G(n, p e )) network model: ◦ with 100 nodes (n) and edge probability p e ranging from to 0.08 (average degree between.25 and 8). ◦ We assign each node a worth drawn uniformly at random from [0, 1] and assign each edge a cascade probability of.5. ◦ This fiqure will show how the average cost and expected loss (plus their sum which we will refer to as total loss) varies when we vary c for the case where p e =.02(average degree of 2).

 Preferential Attachment networks mode: ◦ we generated undirected Preferential Attachment networks using the Barab´asi-Albert model, with n = 100 and with the degree of new nodes ranging from 1 to 4 (average degree between 2 and 8).

 A model of the dependencies of the US critical infrastructure and key resource sectors based on the information on the DHS and FEMA websites ◦ This model contains 18 nodes and 94 directed edges. ◦ We assigned each node a worth in the [0, 1] range:  very important (w t = 1),  somewhat important (w t = 0.5)  relatively unimportant (w t = 0.2). ◦ We also classified importance of each dependency into two categories:  Very significant (corresponding to the probability of contagion p t,t = 0.5)  less significant (with p t,t = 0.1).

 A model of the dependencies of the US critical infrastructure and key resource sectors based on the information on the DHS and FEMA websites ◦ Figure:

 The topology of the core of the Fedwire Interbank Payment Network ◦ This model contains 66 nodes and 181 undirected edges. ◦ In this case we simulate a policymaker with an impartial interest in keeping the system afloat. ◦ we assigned each node a worth of.5, and assign failure probabilities between.05 for low volume edges and.5 for high volume edges.

 The topology of the core of the Fedwire Interbank Payment Network ◦ Figure:

 A comparison between the total loss per node (scaled total loss) for three of these four models(omit the critical infrastructure model)  We can observe that the total loss in all of these models not only follows the same general S-curve pattern but actually seems to follow approximately the same path.

 Finally, let us consider how the cost of defense, the expected loss, and total loss change as we increase network density from to 0.16

 We present a framework for computing optimal randomized security policies in network domains, extending previous linear programming approaches to Stackelberg security games in two ways. 1. We construct a single linear programming formulation which incorporates costs of arbitrary security configurations and may be extended to enforce budget constraints. 2. We demonstrate how to transform a general setting with interdependent assets into a security game with independent targets

 We apply our framework to study four models of interdependent security.  There is a surprising bi-modal behavior of expected utility in preferential attachment networks as defense costs increase, that such networks lead to greater expected losses than Erdos-Renyi networks when defense costs are high.  We also demonstrate that increased network density has substantial deleterious effect on expected losses of targeted attacks