Game Theory and Machine Learning for Cyber Security最新文献

筛选
英文 中文
Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial 使用逻辑回归的概率模型的半自动参数化-教程
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch22
S. Rass, Sandra König, S. Schauer
{"title":"Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial","authors":"S. Rass, Sandra König, S. Schauer","doi":"10.1002/9781119723950.ch22","DOIUrl":"https://doi.org/10.1002/9781119723950.ch22","url":null,"abstract":"Many practical situations require some modeling of uncertainty, and often, this means speaking about events whose likelihood to occur is conveniently expressible by probability parameters, say, a scalar 0 ≤ p ≤ 1 \u0000. The semantics of such values can be arbitrarily complex, ranging from simple probabilities, up to conditional likelihoods, or factors of mere subjective interpretation, such as hyper‐parameters in Bayesian models. This chapter addresses the often untold story of how to find a value for a generic probability parameter p \u0000, or a whole set of such parameters. The simplicity of embodying opaque background dynamics in the mantle of uncertainty, brought into a model by a parameter p \u0000, is often bought at the challenge for the user of a model to find a good value for it. This tutorial is a step‐by‐step guidance through the idea of finding values for probability parameters “by examples.” Provided that a parameter p refers to the likelihood of an event to occur, or conditionally occur under certain settings of other parameters, we describe how to use logistic regression, as an instance of machine learning, to parameterize models using sets of examples. The method is explained in the R programming language and demonstrated along a running showcase application.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115554696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception 利用欺骗在博弈论框架中识别隐形攻击者的可扩展算法
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch3
Anjon Basak, C. Kamhoua, S. Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld
{"title":"Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception","authors":"Anjon Basak, C. Kamhoua, S. Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld","doi":"10.1002/9781119723950.ch3","DOIUrl":"https://doi.org/10.1002/9781119723950.ch3","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals 操纵强化学习:对成本信号的隐形攻击
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch19
Yunhan Huang, Quanyan Zhu
{"title":"Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals","authors":"Yunhan Huang, Quanyan Zhu","doi":"10.1002/9781119723950.ch19","DOIUrl":"https://doi.org/10.1002/9781119723950.ch19","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adversarial Gaussian Process Regression in Sensor Networks 传感器网络中的对抗高斯过程回归
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch9
Yi Li, X. Koutsoukos, Yevgeniy Vorobeychik
{"title":"Adversarial Gaussian Process Regression in Sensor Networks","authors":"Yi Li, X. Koutsoukos, Yevgeniy Vorobeychik","doi":"10.1002/9781119723950.ch9","DOIUrl":"https://doi.org/10.1002/9781119723950.ch9","url":null,"abstract":"Cyber‐physical systems are fundamental to operations of many safety critical systems, from power plants to autonomous cars. Such systems feature a control loop that maps sensor measurements to control decisions. In many applications, these decisions involve maintaining system state features, such as temperature and pressure, in a safe range, with anomaly detection employed to ensure that anomalous or malicious sensor measurements do not subvert system operation. Although anomaly detection has been studied in the literature, many existing approaches focus on the cases with passive adversaries. Our first contribution is a novel stealthy attack on systems featuring Gaussian Process regression (GPR) for anomaly detection—a popular choice for this task. Next, we pose the problem of robust GPR for anomaly detection as a Stackelberg game and present a novel algorithmic approach for solving it. Our experimental evaluation demonstrates both the vulnerability of baseline systems to attack, as well as the increased robustness offered by our approach.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122588654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization 计算机安全的极大极小检测(MAD):一种动态程序表征
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch7
M. O. Sayin, D. Sahabandu, Muhammad Aneeq uz Zaman, R. Poovendran, T. Başar
{"title":"Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization","authors":"M. O. Sayin, D. Sahabandu, Muhammad Aneeq uz Zaman, R. Poovendran, T. Başar","doi":"10.1002/9781119723950.ch7","DOIUrl":"https://doi.org/10.1002/9781119723950.ch7","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evading Machine Learning Based Network Intrusion Detection Systems with GANs 基于GANs的逃避机器学习网络入侵检测系统
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch17
B. Zolbayar, Ryan Sheatsley, P. Mcdaniel, Mike Weisman
{"title":"Evading Machine Learning Based Network Intrusion Detection Systems with GANs","authors":"B. Zolbayar, Ryan Sheatsley, P. Mcdaniel, Mike Weisman","doi":"10.1002/9781119723950.ch17","DOIUrl":"https://doi.org/10.1002/9781119723950.ch17","url":null,"abstract":"Machine learning (ML) is fundamentally changing our way of life with the recent availability of high computational power and big data. Emerging ML‐based techniques of network intrusion detection systems (NIDS) can detect complex cyberattacks, undetectable by conventional techniques. In this chapter, we evaluate the threat of a generative adversarial networks (GAN) aided‐attack on these systems. In our threat model, an adversarial attacker, given access to a training data of the NIDS, adds a minimal perturbation to the feature values of attack traffic to change the DNN's prediction from “malicious” to “benign.” We evaluate our attack algorithm against two state‐of‐the‐art DNN models as well as our own well‐trained DNN model achieving nearly 100% success rates in whitebox setting. We also show that adversarial traffic crafted on these three DNN models also transfer and fool the NIDS models trained with classic ML algorithms with a high accuracy: logistic regression, support vector machine, decision tree and k \u0000‐nearest neighbors. Our work shows that ML‐based NIDS are vulnerable to adversarial network traffic crafted by our GAN‐based attack algorithm.","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"1148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resilient Distributed Adaptive Cyber‐Defense Using Blockchain 使用区块链的弹性分布式自适应网络防御
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch23
G. Cybenko, Roger A. Hallman
{"title":"Resilient Distributed Adaptive Cyber‐Defense Using Blockchain","authors":"G. Cybenko, Roger A. Hallman","doi":"10.1002/9781119723950.ch23","DOIUrl":"https://doi.org/10.1002/9781119723950.ch23","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Concealment Charm ( ConcealGAN ): Automatic Generation of Steganographic Text Using Generative Models to Bypass Censorship 隐藏咒(ConcealGAN):使用生成模型自动生成隐写文本以绕过审查
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch18
Nurpeiis Baimukan, Quanyan Zhu
{"title":"Concealment Charm (\u0000 ConcealGAN\u0000 ): Automatic Generation of Steganographic Text Using Generative Models to Bypass Censorship","authors":"Nurpeiis Baimukan, Quanyan Zhu","doi":"10.1002/9781119723950.ch18","DOIUrl":"https://doi.org/10.1002/9781119723950.ch18","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123597894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trinity: Trust, Resilience and Interpretability of Machine Learning Models 三位一体:机器学习模型的信任、弹性和可解释性
Game Theory and Machine Learning for Cyber Security Pub Date : 2021-09-12 DOI: 10.1002/9781119723950.ch16
Susmit Jha, Brian Jalaian, Anirban Roy, Gunjan Verma
{"title":"Trinity: Trust, Resilience and Interpretability of Machine Learning Models","authors":"Susmit Jha, Brian Jalaian, Anirban Roy, Gunjan Verma","doi":"10.1002/9781119723950.ch16","DOIUrl":"https://doi.org/10.1002/9781119723950.ch16","url":null,"abstract":"","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensor Manipulation Games in Cyber Security 网络安全中的传感器操作游戏
Game Theory and Machine Learning for Cyber Security Pub Date : 1900-01-01 DOI: 10.1002/9781119723950.ch8
J. Hespanha
{"title":"Sensor Manipulation Games in Cyber Security","authors":"J. Hespanha","doi":"10.1002/9781119723950.ch8","DOIUrl":"https://doi.org/10.1002/9781119723950.ch8","url":null,"abstract":"This chapter addresses the problem of making decisions based on sensor measurements that may have been manipulated by an adversary. For concreteness, we focus our attention on making binary decisions that, in the context of cyber security, could correspond to denying access to a sensitive resource, flagging a computer as compromised, deauthorizing a user, closing a firewall, etc. The chapter presents a game theoretical treatment of sensor manipulation and considers two types of sensor manipulation: In measurement manipulation games, the attacker is able to manipulate the measurements of M out of N sensors available to the defender, but the latter does not know which sensors have been manipulated. In sensor reveal games, the attacker exposes to the defender the measurement of a single sensor out of N sensor possibilities, with the caveat that revealing data from non-informative sensors may be costly and interpreted by the defender as strong indication that an attack is afoot. These games cover different aspects of sensor manipulation: Measurement manipulation games","PeriodicalId":332247,"journal":{"name":"Game Theory and Machine Learning for Cyber Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信