{"title":"Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial","authors":"S. Rass, Sandra König, S. Schauer","doi":"10.1002/9781119723950.ch22","DOIUrl":"https://doi.org/10.1002/9781119723950.ch22","url":null,"abstract":"Many practical situations require some modeling of uncertainty, and often, this means speaking about events whose likelihood to occur is conveniently expressible by probability parameters, say, a scalar 0 ≤ p ≤ 1 \u0000. The semantics of such values can be arbitrarily complex, ranging from simple probabilities, up to conditional likelihoods, or factors of mere subjective interpretation, such as hyper‐parameters in Bayesian models. This chapter addresses the often untold story of how to find a value for a generic probability parameter p \u0000, or a whole set of such parameters. The simplicity of embodying opaque background dynamics in the mantle of uncertainty, brought into a model by a parameter p \u0000, is often bought at the challenge for the user of a model to find a good value for it. This tutorial is a step‐by‐step guidance through the idea of finding values for probability parameters “by examples.” Provided that a parameter p refers to the likelihood of an event to occur, or conditionally occur under certain settings of other parameters, we describe how to use logistic regression, as an instance of machine learning, to parameterize models using sets of examples. The method is explained in the R programming language and demonstrated along a running showcase application.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115554696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anjon Basak, C. Kamhoua, S. Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld
{"title":"Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception","authors":"Anjon Basak, C. Kamhoua, S. Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld","doi":"10.1002/9781119723950.ch3","DOIUrl":"https://doi.org/10.1002/9781119723950.ch3","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals","authors":"Yunhan Huang, Quanyan Zhu","doi":"10.1002/9781119723950.ch19","DOIUrl":"https://doi.org/10.1002/9781119723950.ch19","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Gaussian Process Regression in Sensor Networks","authors":"Yi Li, X. Koutsoukos, Yevgeniy Vorobeychik","doi":"10.1002/9781119723950.ch9","DOIUrl":"https://doi.org/10.1002/9781119723950.ch9","url":null,"abstract":"Cyber‐physical systems are fundamental to operations of many safety critical systems, from power plants to autonomous cars. Such systems feature a control loop that maps sensor measurements to control decisions. In many applications, these decisions involve maintaining system state features, such as temperature and pressure, in a safe range, with anomaly detection employed to ensure that anomalous or malicious sensor measurements do not subvert system operation. Although anomaly detection has been studied in the literature, many existing approaches focus on the cases with passive adversaries. Our first contribution is a novel stealthy attack on systems featuring Gaussian Process regression (GPR) for anomaly detection—a popular choice for this task. Next, we pose the problem of robust GPR for anomaly detection as a Stackelberg game and present a novel algorithmic approach for solving it. Our experimental evaluation demonstrates both the vulnerability of baseline systems to attack, as well as the increased robustness offered by our approach.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122588654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. O. Sayin, D. Sahabandu, Muhammad Aneeq uz Zaman, R. Poovendran, T. Başar
{"title":"Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization","authors":"M. O. Sayin, D. Sahabandu, Muhammad Aneeq uz Zaman, R. Poovendran, T. Başar","doi":"10.1002/9781119723950.ch7","DOIUrl":"https://doi.org/10.1002/9781119723950.ch7","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Zolbayar, Ryan Sheatsley, P. Mcdaniel, Mike Weisman
{"title":"Evading Machine Learning Based Network Intrusion Detection Systems with GANs","authors":"B. Zolbayar, Ryan Sheatsley, P. Mcdaniel, Mike Weisman","doi":"10.1002/9781119723950.ch17","DOIUrl":"https://doi.org/10.1002/9781119723950.ch17","url":null,"abstract":"Machine learning (ML) is fundamentally changing our way of life with the recent availability of high computational power and big data. Emerging ML‐based techniques of network intrusion detection systems (NIDS) can detect complex cyberattacks, undetectable by conventional techniques. In this chapter, we evaluate the threat of a generative adversarial networks (GAN) aided‐attack on these systems. In our threat model, an adversarial attacker, given access to a training data of the NIDS, adds a minimal perturbation to the feature values of attack traffic to change the DNN's prediction from “malicious” to “benign.” We evaluate our attack algorithm against two state‐of‐the‐art DNN models as well as our own well‐trained DNN model achieving nearly 100% success rates in whitebox setting. We also show that adversarial traffic crafted on these three DNN models also transfer and fool the NIDS models trained with classic ML algorithms with a high accuracy: logistic regression, support vector machine, decision tree and k \u0000‐nearest neighbors. Our work shows that ML‐based NIDS are vulnerable to adversarial network traffic crafted by our GAN‐based attack algorithm.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"1148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Distributed Adaptive Cyber‐Defense Using Blockchain","authors":"G. Cybenko, Roger A. Hallman","doi":"10.1002/9781119723950.ch23","DOIUrl":"https://doi.org/10.1002/9781119723950.ch23","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concealment Charm (\u0000 ConcealGAN\u0000 ): Automatic Generation of Steganographic Text Using Generative Models to Bypass Censorship","authors":"Nurpeiis Baimukan, Quanyan Zhu","doi":"10.1002/9781119723950.ch18","DOIUrl":"https://doi.org/10.1002/9781119723950.ch18","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123597894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}