Network Security A Decision and Game-Theoretic Approach

Size: px
Start display at page:

Download "Network Security A Decision and Game-Theoretic Approach"

Transcription

1 Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA Щ CAMBRIDGE UNIVERSITY PRESS

2 Contents Preface Acknowledgments Artwork Notation page xii xv xvi xvii Part I Introduction Introduction Network security The approach Motivating examples Security games Security risk-management Optimal malware epidemic response Discussion and further reading 18 Network security concepts Networks and security threats Networks and the World Wide Web Security threats Attackers, defenders, and their motives Attackers Defenders Defense mechanisms Security tradeoffs and risk-management Security tradeoffs Security risk-management Discussion and further reading 34

3 viii Contents Part II Security games 37 3 Deterministic security games Security game model Intrusion detection games Matrix games Games with dynamic information Sensitivity analysis Modeling malicious behavior in social networks Security games for vehicular networks Vehicular network model Attack and defense model Game formulation and numerical analysis Security games in wireless networks Random access security games Interference limited multiple access security games Revocation games Revocation game model Sequential revocation games Static revocation games Discussion and further reading 72 4 Stochastic security games Markov security games Markov game model Solving Markov games Stochastic intrusion detection game Security of interconnected systems Analysis of an illustrative example Linear influence models Malware filter placement game Stochastic game formulation Simulations Discussion and further reading 95 5 Security games with information limitations Bayesian security games Bayesian intrusion detection game Bayesian games for wireless security Security games with observation and decision errors Game model and fictitious play Fictitious play with observation errors Fictitious play with decision errors 120

4 5.2.4 Time-invariant and adaptive fictitious play 5.3 Discussion and further reading Part III Decision making for network security 6 Security risk-management 6.1 Quantitative risk-management Risk in networked systems and organizations A probabilistic risk framework Dynamic risk mitigation and control 6.2 Security investment games Influence network and game model Equilibrium and convergence analysis Incentives and game design 6.3 Cooperative games for security risk-management Coalitional game model Coalition formation under ideal cooperation 6.4 Discussion and further reading 7 Resource allocation for security 7.1 An optimization approach to malware filtering Traffic centrality measures Filtering problem formulations 7.2 A robust control framework for security response Network traffic filtering model Derivation of optimal controller and state estimator 7.3 Optimal and robust epidemic response Epidemic models Feedback response for malware removal Multiple networks 7.4 Discussion and further reading 8 Usability, trust, and privacy 8.1 Security and usability A system for security alert dissemination Effective administrator response 8.2 Digital trust in online communities Community trust game Dynamics and convergence Numerical analysis 8.3 Location privacy in mobile networks A locati on privacy model

5 x Contents Location privacy games Discussion and further reading 215 Part IV Security attack and intrusion detection Machine learning for intrusion and anomaly detection Intrusion and anomaly detection Intrusion detection and prevention systems Open problems and challenges Machine learning for security: an overview Overview of machine-learning methods Open problems and challenges Distributed machine learning SVM classification and decomposition Parallel update algorithms Active set method and a numerical example Behavioral malware detection for mobile devices Discussion and further reading Hypothesis testing for attack detection Hypothesis testing and network security An overview of hypothesis testing Вayesian hypothesis testing Minimax hypothesis testing Neyman-Pearson hypothesis testing Other hypothesis testing schemes Decentralized hypothesis testing with correlated observations Decentralized hypothesis testing Decision rules at the sensors and at the fusion center Decentralized Bayesian hypothesis testing Decentralized Neyman-Pearson hypothesis testing The majority vote versus the likelihood ratio test An algorithm to compute the optimal thresholds Discussion and further reading 273 A Optimization, game theory, and optimal and robust control 274 A.l Introduction to optimization 274 A. 1.1 Sets, spaces, and norms 274 A. 1.2 Functionals, continuity, and convexity 275 A. 1.3 Optimization of functionals 276 A.2 Introduction to noncooperative game theory 281 A.2.1 General formulation for noncooperative games and equilibrium solutions 282

6 Contents xi A.2.2 Existence of Nash and saddle-point equilibria in finite games 284 A.2.3 Existence and uniqueness of Nash and saddle-point equilibria in continuous-kernel (infinite) games 285 A.2.4 Online computation of Nash equilibrium policies 287 A.3 Introduction to optimal and robust control theory 288 A.3.1 Dynamic programming for discrete-time systems 289 A.3.2 Dynamic programming for continuous-time systems 291 A.3.3 The minimum principle 294 A.3.4 H -optimal control 296 References Index

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction 6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process Techniques for Supporting Prediction of Security Breaches in Critical Cloud Infrastructures Using Bayesian Network and Markov Decision Process by Vinjith Nagaraja A Thesis Presentation in Partial Fulfillment

More information

Control Systems with Actuator Saturation

Control Systems with Actuator Saturation Control Systems with Actuator Saturation Analysis and Design Tingshu Hu Zongli Lin With 67 Figures Birkhauser Boston Basel Berlin Preface xiii 1 Introduction 1 1.1 Linear Systems with Actuator Saturation

More information

Revenue Management and Survival Analysis in the Automobile Industry

Revenue Management and Survival Analysis in the Automobile Industry Andre Jerenz Revenue Management and Survival Analysis in the Automobile Industry With a foreword by Prof. Dr. Ulrich Tushaus GABLER EDITION WISSENSCHAFT List of Figures List of Tables Nomenclature xiii

More information

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework for Adversarial Learning A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,

More information

Forecasting and Hedging in the Foreign Exchange Markets

Forecasting and Hedging in the Foreign Exchange Markets Christian Ullrich Forecasting and Hedging in the Foreign Exchange Markets 4u Springer Contents Part I Introduction 1 Motivation 3 2 Analytical Outlook 7 2.1 Foreign Exchange Market Predictability 7 2.2

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Modeling Internet Security Investments Tackling Topological Information Uncertainty Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom

More information

Game Theory Meets Network Security and Privacy

Game Theory Meets Network Security and Privacy Game Theory Meets Network Security and Privacy Mohammad Hossein Manshaei Isfahan University of Technology (IUT), Iran Quanyan Zhu University of Illinois at Urbana-Champaign (UIUC), USA Tansu Alpcan University

More information

Software Performance and Scalability

Software Performance and Scalability Software Performance and Scalability A Quantitative Approach Henry H. Liu ^ IEEE )computer society WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents PREFACE ACKNOWLEDGMENTS xv xxi Introduction 1 Performance

More information

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments

COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for

More information

Univariate and Multivariate Methods PEARSON. Addison Wesley

Univariate and Multivariate Methods PEARSON. Addison Wesley Time Series Analysis Univariate and Multivariate Methods SECOND EDITION William W. S. Wei Department of Statistics The Fox School of Business and Management Temple University PEARSON Addison Wesley Boston

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department

More information

Advanced Signal Processing and Digital Noise Reduction

Advanced Signal Processing and Digital Noise Reduction Advanced Signal Processing and Digital Noise Reduction Saeed V. Vaseghi Queen's University of Belfast UK WILEY HTEUBNER A Partnership between John Wiley & Sons and B. G. Teubner Publishers Chichester New

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group Cloud Computing Data-Intensive Computing and Scheduling Frederic Magoules, Jie Pan, and Fei Teng SILKQH CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor

More information

2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering

2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering 2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering Compulsory Courses IENG540 Optimization Models and Algorithms In the course important deterministic optimization

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

How will the programme be delivered (e.g. inter-institutional, summerschools, lectures, placement, rotations, on-line etc.):

How will the programme be delivered (e.g. inter-institutional, summerschools, lectures, placement, rotations, on-line etc.): Titles of Programme: Hamilton Hamilton Institute Institute Structured PhD Structured PhD Minimum 30 credits. 15 of Programme which must be obtained from Generic/Transferable skills modules and 15 from

More information

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2 Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are

More information

Companies often face nonstationary demand due to product life cycles and seasonality, and nonstationary

Companies often face nonstationary demand due to product life cycles and seasonality, and nonstationary MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 14, No. 3, Summer 2012, pp. 414 422 ISSN 1523-4614 (print) ISSN 1526-5498 (online) http://dx.doi.org/10.1287/msom.1110.0373 2012 INFORMS Single-Stage

More information

Message-passing sequential detection of multiple change points in networks

Message-passing sequential detection of multiple change points in networks Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal

More information

Dong-Ping Song. Optimal Control and Optimization. of Stochastic. Supply Chain Systems. 4^ Springer

Dong-Ping Song. Optimal Control and Optimization. of Stochastic. Supply Chain Systems. 4^ Springer Dong-Ping Song Optimal Control and Optimization Supply Chain Systems of Stochastic 4^ Springer Contents 1 Stochastic Supply Chain Systems 1 1.1 Introduction 1 1.2 Uncertainties'in Supply Chain Systems

More information

Dynamic Modeling, Predictive Control and Performance Monitoring

Dynamic Modeling, Predictive Control and Performance Monitoring Biao Huang, Ramesh Kadali Dynamic Modeling, Predictive Control and Performance Monitoring A Data-driven Subspace Approach 4y Spri nnger g< Contents Notation XIX 1 Introduction 1 1.1 An Overview of This

More information

NEURAL NETWORKS A Comprehensive Foundation

NEURAL NETWORKS A Comprehensive Foundation NEURAL NETWORKS A Comprehensive Foundation Second Edition Simon Haykin McMaster University Hamilton, Ontario, Canada Prentice Hall Prentice Hall Upper Saddle River; New Jersey 07458 Preface xii Acknowledgments

More information

Probability and Statistics

Probability and Statistics Probability and Statistics Syllabus for the TEMPUS SEE PhD Course (Podgorica, April 4 29, 2011) Franz Kappel 1 Institute for Mathematics and Scientific Computing University of Graz Žaneta Popeska 2 Faculty

More information

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,

More information

Role of Anomaly IDS in Network

Role of Anomaly IDS in Network Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,

More information

GAMES FOR BUSINESS AND ECONOMICS

GAMES FOR BUSINESS AND ECONOMICS GAMES FOR BUSINESS AND ECONOMICS ROY/GARDNER Indiana University Nachrichtentechnische BibliotHek TUD Inv.-Nr.: /S.JOtUM- John Wiley & Sons, Inc. 5" New York Chichester Brisbane Toronto Singapore Contents

More information

A Game-Theoretic Model and Algorithm for Load Balancing in Distributed Systems

A Game-Theoretic Model and Algorithm for Load Balancing in Distributed Systems In Proc of the 6th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2002, Workshop on Advances in Parallel and Distributed Computational Models (APDCM 02, April 5, 2002, Fort Lauderdale,

More information

Bayesian Machine Learning (ML): Modeling And Inference in Big Data. Zhuhua Cai Google, Rice University [email protected]

Bayesian Machine Learning (ML): Modeling And Inference in Big Data. Zhuhua Cai Google, Rice University caizhua@gmail.com Bayesian Machine Learning (ML): Modeling And Inference in Big Data Zhuhua Cai Google Rice University [email protected] 1 Syllabus Bayesian ML Concepts (Today) Bayesian ML on MapReduce (Next morning) Bayesian

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Sokratis K. Katsikas Dept. of Digital Systems University of Piraeus [email protected] Agenda Overview of IDS Intrusion prevention using game theory Reducing false positives Clustering

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

Intrusion Forecasting Framework for Early Warning System against Cyber Attack Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting

More information

Applied mathematics and mathematical statistics

Applied mathematics and mathematical statistics Applied mathematics and mathematical statistics The graduate school is organised within the Department of Mathematical Sciences.. Deputy head of department: Aila Särkkä Director of Graduate Studies: Marija

More information

G= (I, S, U), (1) where G is a particular game, I is a finite set of players, S = {S i }, (2)

G= (I, S, U), (1) where G is a particular game, I is a finite set of players, S = {S i }, (2) JOURNAL OF NETWORKS, VOL. 6, NO. 3, MARCH 2011 521 A Survey of Game Theory in Wireless Sensor Networks Security Shigen Shen 1, 2, Guangxue Yue 2, 3, 4, Qiying Cao 1 1 College of Information Science and

More information

Learning outcomes. Knowledge and understanding. Competence and skills

Learning outcomes. Knowledge and understanding. Competence and skills Syllabus Master s Programme in Statistics and Data Mining 120 ECTS Credits Aim The rapid growth of databases provides scientists and business people with vast new resources. This programme meets the challenges

More information

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing UNCLASSIFIED/FOR OFFICIAL USE ONLY Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing What is CDM? UNCLASSIFIED/FOR OFFICIAL USE ONLY The CDM program is

More information

APPLIED MISSING DATA ANALYSIS

APPLIED MISSING DATA ANALYSIS APPLIED MISSING DATA ANALYSIS Craig K. Enders Series Editor's Note by Todd D. little THE GUILFORD PRESS New York London Contents 1 An Introduction to Missing Data 1 1.1 Introduction 1 1.2 Chapter Overview

More information

Data Mining for Network Intrusion Detection

Data Mining for Network Intrusion Detection Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much

More information

Network Mission Assurance

Network Mission Assurance Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com

More information

Statistics Graduate Courses

Statistics Graduate Courses Statistics Graduate Courses STAT 7002--Topics in Statistics-Biological/Physical/Mathematics (cr.arr.).organized study of selected topics. Subjects and earnable credit may vary from semester to semester.

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

Kalman Filter Applied to a Active Queue Management Problem

Kalman Filter Applied to a Active Queue Management Problem IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 4 Ver. III (Jul Aug. 2014), PP 23-27 Jyoti Pandey 1 and Prof. Aashih Hiradhar 2 Department

More information

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection? Contents Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Motivation and basics (Why and what?) IDS types and principles Key Data Problems with

More information

life science data mining

life science data mining life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! [email protected]! http://www.cs.toronto.edu/~rsalakhu/ Lecture 6 Three Approaches to Classification Construct

More information

Introduction to Engineering System Dynamics

Introduction to Engineering System Dynamics CHAPTER 0 Introduction to Engineering System Dynamics 0.1 INTRODUCTION The objective of an engineering analysis of a dynamic system is prediction of its behaviour or performance. Real dynamic systems are

More information

State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:

State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number: State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013 About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Practical Intrusion Analysis

Practical Intrusion Analysis Practical Intrusion Analysis PREVENTION AND DETECTION FOR THE TWENTY-FIRST CENTURY Ryan Trost TT Ar Addison-Wesley Upper Saddle River, NJ Boston Indianapolis * San Francisco New York Toronto Montreal London

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming 1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson Fellow, IEEE, Danfeng (Daphne) Yao, Member, IEEE

More information

Online Hidden Markov Model Parameter Estimation and Minimax Robust Quickest Change Detection in Uncertain Stochastic Processes

Online Hidden Markov Model Parameter Estimation and Minimax Robust Quickest Change Detection in Uncertain Stochastic Processes Online Hidden Markov Model Parameter Estimation and Minimax Robust Quickest Change Detection in Uncertain Stochastic Processes by Timothy Liam Molloy BE(AeroAv) (Hons) A thesis submitted for the degree

More information

Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management

Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management Patrick Maillé, Peter Reichl, and Bruno Tuffin 1 Introduction Telecommunication networks are becoming ubiquitous in our society,

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming 1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming

More information

AN INTRODUCTION TO GAME THEORY

AN INTRODUCTION TO GAME THEORY AN INTRODUCTION TO GAME THEORY 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. MARTIN J. OSBORNE University of Toronto

More information

Model Combination. 24 Novembre 2009

Model Combination. 24 Novembre 2009 Model Combination 24 Novembre 2009 Datamining 1 2009-2010 Plan 1 Principles of model combination 2 Resampling methods Bagging Random Forests Boosting 3 Hybrid methods Stacking Generic algorithm for mulistrategy

More information

Risk Management for IT Security: When Theory Meets Practice

Risk Management for IT Security: When Theory Meets Practice Risk Management for IT Security: When Theory Meets Practice Anil Kumar Chorppath Technical University of Munich Munich, Germany Email: [email protected] Tansu Alpcan The University of Melbourne Melbourne,

More information

List of Ph.D. Courses

List of Ph.D. Courses Research Methods Courses (5 courses/15 hours) List of Ph.D. Courses The research methods set consists of five courses (15 hours) that discuss the process of research and key methodological issues encountered

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

Towards a Unifying Security Framework for Cyber- Physical Systems

Towards a Unifying Security Framework for Cyber- Physical Systems Towards a Unifying Security Framework for Cyber- Physical Systems Quanyan Zhu and Tamer Başar Coordinated Science Laboratory Department of Electrical and Computer Engineering University of Illinois at

More information

Game Theory Meets Information Security Management

Game Theory Meets Information Security Management Game Theory Meets Information Security Management Andrew Fielder 1, Emmanouil Panaousis 2, Pasquale Malacaria 2, Chris Hankin 1, and Fabrizio Smeraldi 2 1 Imperial College London {andrew.fielder,c.hankin}@imperial.ac.uk

More information