2014
DOI: 10.1109/tsp.2014.2336613
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian Discovery of Threat Networks

Abstract: A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 71 publications
0
18
0
Order By: Relevance
“…The goal is to find a vector that is projected substantially onto itself by the residuals matrix, but with few nonzero components. Put formally, the objective is to solve (17) where denotes the quasi-norm (the number of nonzero components in a vector). This, however, is an integer programming problem and is NP-hard.…”
Section: Sparse Principal Component Analysismentioning
confidence: 99%
“…The goal is to find a vector that is projected substantially onto itself by the residuals matrix, but with few nonzero components. Put formally, the objective is to solve (17) where denotes the quasi-norm (the number of nonzero components in a vector). This, however, is an integer programming problem and is NP-hard.…”
Section: Sparse Principal Component Analysismentioning
confidence: 99%
“…Paper [2] has showed the use of entropy to detect the DDOS attack using IP Trace back scheme against DDOS attacks based on entropy variations. This scheme is implemented by storing the information of network flow between systems at the routers.…”
Section: Related Workmentioning
confidence: 99%
“…Method work iterative until a Statistical probability [11] is not compute for each node of a network. In the probabilistic threat propagation [12] (PTP) the probability of a node being malicious is proportional to the level of maliciousness of its neighbor nodes and by applying entropy [2] we can calculate the randomness of a system.…”
Section: Introductionmentioning
confidence: 99%
“…Threat propagation algorithm [10] is similar to the class of personalized PageRank algorithms, but has the following distinguishing features. It views the graph partitioning problem as a 2 N multiple hypothesis test problem, where membership (to the cut set) or non-membership needs to be determined for all the vertices.…”
Section: Threat Propagationmentioning
confidence: 99%
“…This modification biases diffusion towards regions of the graph that are tightly connected to the cue vertex, therefore implicitly leading to localized, sparse solutions around that vertex. The algorithm is proved to be optimum in the Neyman-Pearson sense of maximizing the probability of detection at a fixed false alarm probability [10]. This method is distinct from the others in that it does not search for local community structure, but rather prioritizes vertices based on an assumed model for threat movement through the network.…”
Section: Threat Propagationmentioning
confidence: 99%