An Adversarial Risk Analysis Approach to Fraud Detection



Similar documents
Adversarial Risk Analysis Models for

Adversarial Risk Analysis

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.

Exam Introduction Mathematical Finance and Insurance

Tutorials: Abstracts and Speakers Bio

Computing the Electricity Market Equilibrium: Uses of market equilibrium models

Individual security and network design

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile

PROJECT RISK MANAGEMENT

QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE

Discussion of Çakmakli and Altug: Contructing Coincident Economic Indicators for Emerging Economies

Stochastic programming approach to ALM in Finnish pension insurance companies p.1/36

A Game Theoretical Framework for Adversarial Learning

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

ERM Learning Objectives

An Open and Safe Europe What s next?

Targetting Audits Using Predictive Analytics

Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague.

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised

RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS

Sandro Brusco. Education

Urban Transport Security presented by Patrick Dillenseger RATP

Asset Liability Management for Life Insurance: a Dynamic Approach

How To Write An Article On The European Cyberspace Policy And Security Strategy

The Elasticity of Taxable Income: A Non-Technical Summary

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

2 Gabi Siboni, 1 Senior Research Fellow and Director,

PROJECT RISK MANAGEMENT

Designing public private crop insurance in Finland

ISO 31000: ISO/IEC & ISO Guide 73: New Standards for the Management of Risk

Security risk analysis approach for on-board vehicle networks

On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions

Advanced Threat Protection with Dell SecureWorks Security Services

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond

Monte Carlo Simulation

Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses

Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100)

Insurance as Operational Risk Management Tool

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

National Infrastructure Protection Center

The promise and pitfalls of cyber insurance January 2016

idata Improving Defences Against Targeted Attack

Safety Risk Impact Analysis of an ATC Runway Incursion Alert System. Sybert Stroeve, Henk Blom, Bert Bakker

COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL INSTITUTIONS

Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation

On the European experience in critical infrastructure protection

Chapter 13: Binary and Mixed-Integer Programming

Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1

A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM:

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Chapter 14 Managing Operational Risks with Bayesian Networks

How To Defend Yourself Against Cyber Attacks

Schedule Risk Analysis Simulator using Beta Distribution

On Compulsory Per-Claim Deductibles in Automobile Insurance

Lecture Note 1 Set and Probability Theory. MIT Spring 2006 Herman Bennett

Master in International Business

The F Word - Why Facilities Matter

Retirement Financial Planning: A State/Preference Approach. William F. Sharpe 1 February, 2006

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Internet Governance and Cybersecurity Patrick Curry MACCSA

Revenue management based hospital appointment scheduling

Asset Management Contracts and Equilibrium Prices

Total deliverability gas storage analysis methodology and case study

Knowledge. Practical guide to competition damages claims in the UK

How To Find Out What Search Strategy Is Used In The U.S. Auto Insurance Industry

READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE

INT 3 Schedule Risk Analysis

A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA: A FIRST REPORT

Update On Smart Grid Cyber Security

Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control

Cyber Security Research and Development: A Homeland Security Perspective

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Improving pre-operational production efficiency estimates

Fighting Advanced Threats

OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

Abstract. 1 Introduction

Statistical Analysis of Life Insurance Policy Termination and Survivorship

Simulation and Risk Analysis

Discrete Optimization

An effective approach to preventing application fraud. Experian Fraud Analytics

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Transcription:

An Adversarial Risk Analysis Approach to Fraud Detection J. Cano 1 D. Ríos Insua 2 1 URJC 2 ICMAT-CSIC, Spain 20th IFORS. Barcelona. July 15, 2014

Outline A framework for risk analysis A framework for adversarial risk analysis A framework for risk analysis and adversarial risk analysis Case study: fighting fare evasion 2/25

General overview Risk analysis methodology to mitigate negative effects of threats that may harm system performance. Adversarial risk analysis expands RA to deal with intelligent intentional adversaries. Application in fraud detection in relation with access to a paid facility. 3/25

1. A framework for risk analysis 4/25

Risk analysis influence diagrams and expected utility Hazard Mitigation Option Hazard Extra Mitigation Extra Utility Total Utility Total Utility Basic With risk assessment With risk management ψ = n u(c)π(c)dc, ψ r = q j j=0 u(c)π j (c)dc, n ψ m = max q j (m) u(c)π j (c m)dc m M j=0 5/25

2. A framework for adversarial risk analysis 6/25

Sequential Defend-Attack model Defence Option Hazard Attack Option Defence Option Hazard Attack Option Defence Option Hazard Attack Option u D u A u D u A Coupled Defender s problem Attacker s problem 7/25

Solving strategy Defender aims at finding optimal defense d. Consequences evaluated through utility u D (d,s) ψ D (d a) = u D (d,s)p D (s d,a)ds. Suppose Defender able to assess p D (a d). Then, she can compute ψ D (d) = ψ D (d a)p D (a d)ds. and solve d max d D ψ D (d). 8/25

Assessment of Attacker s intentions To obtain p D (a d), solve Attacker s problem (E.U. max.) a (d) = arg max a A u A (a,s)p A (s d,a)ds. Defender lacks knowledge ( u A ( ),p A (s ) ) ( U A,P A ). Approximate p D (a d) through Monte Carlo simulation. Assessment of P A ( ) typically based on p D ( ) Dirichlet distribution (process) for discrete (continuous). For U A, information about Attacker s interests Aggregate with weighted measurable value function. Assume risk proneness. Distributions over weights and risk proneness coefficient. 9/25

3. A framework for risk analysis and adversarial risk analysis 10/25

General influence diagram Mitigation Option Hazard Attack Attacker Mitigation Extra Attack Attacker Total u D u A Incorporate uncertainty from non-adversarial threats. Defender s u D aggregates consequences from both problems. 11/25

4. Case study: fighting fare evasion 12/25

Influence diagram Countermeasures Customers Prop. of fraudsters Prop. of colluders Colluders decision Fraud cost operator colluders u D u C 13/25

Description of problem Metro operator D protecting from: Fare evasion. Two types of evaders: Standard (standard random process). Colluders (ARA; explicitly modeling intentionality). Role Features d 1 Inspector Prev./rec. Inspect customers. Collect fines d 2 Door guard Prev. Control access points d 3 Guard Prev. Patrol along the facility d 4 Door Prev. New secured automatic access doors d 5 Ticket clerk Prev. Current little implication in security 14/25

Feasible portfolios Associated unit costs q 1,q 2,q 3,q 4. d 5 {0,1} (d 5 = 1 clerks involved, incurred costs q 5 ). q 1 d 1 + q 2 d 2 + q 3 d 3 + q 4 d 4 B, d 1,d 2,d 3,d 4 0, d 1,d 2,d 3,d 4 integer, d 4 d 4, d 5 {0,1}, ( d 4 maximum # of doors that may be replaced). 15/25

Defender s problem Operator invests d = (d 1,d 2,d 3,d 4,d 5 ). (Constraints) Fare evasion costs (partly mitigated by fines). φ (d) evaders proportion. q(d 1 ) inspection proportion ( φ(d) = φ 0 exp 5 k=1 γ k d k ) + φ r. γk s effect of (d 1,d 2,d 3,d 4,d 5 ) on fraud proportion. (φ 0 + φ r ) current fraud proportion. φ r residual proportion even with infinite resources. Each new inspector # inspected tickets (nonlinear increase). 1 φ(d) N 1 civic customers pay ticket. φ(d)[1 q(d 1 )] N 2 not pay, not caught (loss v). φ(d)q(d 1 ) N 3 do not pay but caught (income f ). 16/25

Attacker s problem Colluders see security investments d (Seq D-A). Fare evasion proportion r r, inspection proportion q A (d 1 ) 1 r M 1 pay, abortion (income v). r (1 q A (d 1 )) M 2 not pay, not caught (loss v). r q A (d 1 ) M 3 not pay, caught (income f ). Operational costs, including preparation costs q c A = v(m 2 M 1 ) fm 3 rqm. Colluders risk prone in benefits u A (c A ) = exp(k A c A ), k A > 0. Target: Assess h(r d), Defender s beliefs over proportion of evasion attempts given d. 17/25

Solving the Defender s problem Operator benefit/cost balance c D (N 1,N 2,N 3,M 1,M 2,M 3,d) = v(n 2 + M 2 ) + f (N 3 + M 3 ) Operator risk averse to increase in income, u D (c D ) = exp( k D c D ). Evaluate security plan d maximizing expected utility 5 k=1 q k d k. [ ] 1 ψ D (x) = p M1M2M3d pn 1 d p2 N 2 d p3 N 3 d u D(c D ) N 1,N 2,N 3 M 1,M 2,M 3 h(r d)dr. 18/25

Results 0.5 3% 3% 6% 6% 12% 12% Expected utility 1 1.5 x * x * x * 0 10 20 30 40 50 60 70 80 Portfolio 19/25

Results p 0 + p r = 0.03,M = 30000 p 0 + p r = 0.06,M = 60000 p 0 + p r = 0.12,M = 120000 x Invest. ψ(x) Income x Invest. ψ(x) x Invest. ψ(x) (1,0,0,0,0) 50000 1.12 22826 (1,2,0,0,0) 100000 0.89 (1,3,0,0,0) 125000 0.46 (1,0,0,0,0) 50000 1.12 22826 (1,0,0,0,0) 50000 0.98 (1,0,0,0,0) 50000 0.75 (0,3,0,0,0) 75000 1.20 36797 (0,3,0,0,0) 75000 0.98 (0,3,0,0,0) 75000 0.66 (0,0,2,0,0) 60000 1.22 39409 (0,0,2,0,0) 60000 1.06 (0,0,2,0,0) 60000 0.81 (0,0,0,1,0) 15000 1.43 71255 (0,0,0,1,0) 15000 1.82 (0,0,0,1,0) 15000 3.52 (0,0,0,0,1) 15000 1.45 74147 (0,0,0,0,1) 15000 2.10 (0,0,0,0,1) 15000 4.19 (0,3,2,1,1) 150000 1.63 97348 (0,3,2,1,1) 150000 1.20 (0,3,2,1,1) 150000 0.66 (0,3,2,1,0) 150000 1.51 82303 (0,3,2,1,0) 150000 1.11 (0,3,2,1,0) 150000 0.61 Optimal portfolio d = (1,0,0,0,0), with ψ(x) = 1.12, associated investment 50,000 euros, and expected losses 22,826 euros (investment plus expected balance between fraud and collected fines, +27, 174 euros). Results sensitive to variations in evasion proportion φ r + φ 0. Operator needs higher investments for higher proportions. Essential that inspectors really carry out their task. 20/25

Conclusions RA+ARA methodology. Sequential Defend-Attack model as basic template. Expand basic template with additional uncertainty nodes. Case study in metro security fare evasion. 21/25

Current methodological developments ARA (Ríos Insua et al., 2009) approach for multithreat problem over multiple sites. (Ríos Insua et al., 2014b) Multiple uncoordinated attacks. Outcome of attacks might affect each other. Extension to multiple sites. Sequential Defend-Attack for each site/threat. Models related by resource constraints and value aggregation. No particular spatial structure. Case study: metro network protection against Fare evasion. (Ríos Insua et al., 2014a) Pickpocketing by a team. 22/25

Future developments Multiple defenders and eventual coordination. Coordination and rationality type of attacks. More complex interactions between defenders and attackers. Mobility of resources. 23/25

Acknowledgments This project has received funding from the European Union s Seventh Framework Programme for Research, Technological Development and Demonstration under grant agreement no 285223. Work has been also supported by the Spanish Ministry of Economy and Innovation program MTM2011-28983-C03-01, the Government of Madrid RIESGOS-CM program S2009/ESP-1685 and the AXA-ICMAT Chair on Adversarial Risk Analysis. Grateful to TMB experts and stakeholders for fruitful discussion about modeling issues. 24/25

Bibliography Ríos Insua, D., J. Cano, M. Pellot, R. Ortega. 2014. Current Trends in Bayesian Methodology with Applications, chap. From Risk Analysis to Adversarial Risk Analysis. CRC Press, To appear. Ríos Insua, D., J. Cano, M. Pellot, R. Ortega. 2014. Multithreat Multisite Protection: A Case Study in Metro Security. Submitted for publication. Ríos Insua, D., J. Ríos, D. Banks. 2009. Adversarial risk analysis. Journal of the American Statistical Association 104(486) 841 854. 25/25