DocumentCode :
3252760
Title :
Optimal index policies for quickest localization of anomaly in cyber networks
Author :
Cohen, Kobi ; Qing Zhao ; Swami, Ananthram
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of California, Davis, Davis, CA, USA
fYear :
2013
fDate :
3-5 Dec. 2013
Firstpage :
221
Lastpage :
224
Abstract :
We consider the problem of quickest localization of anomaly in a resource-constrained cyber network consisting of multiple components. Due to resource constraints, only one component can be probed at each time. The observations are random realizations drawn from two different distributions depending on whether the component is normal or anomalous. Components are assigned priorities. Components with higher priorities in an abnormal state should be fixed before components with lower priorities to reduce the overall damage to the network. The objective is to minimize the expected weighted sum of completion times of abnormal components subject to error probability constraints. We consider two different anomaly models: the independent model in which each component can be abnormal independent of other components, and the exclusive model in which there is one and only one abnormal component. We develop index policies under both models. Optimal low-complexity algorithms are derived for the simple hypotheses case, where the distribution is completely known under both hypotheses. Asymptotically (as the error probability approaches zero) optimal low-complexity algorithms are derived for the composite hypotheses case, where there is uncertainty in the distribution parameters. Simulation results then illustrate the performance of the algorithms.
Keywords :
computer network security; minimisation; probability; statistical testing; abnormal components; abnormal independent component; abnormal state; anomalous component; anomaly localization; asymptotically optimal low-complexity algorithms; component priorities; composite hypothesis; distribution parameter uncertainty; distribution parameters; error probability constraints; expected weighted completion time sum minimization; independent model; normal component; optimal index policies; overall network damage reduction; resource-constrained cyber network; Approximation methods; Error probability; Indexes; Intrusion detection; Optimization; Testing; Uncertainty; Anomaly detection; intrusion detection; sequential hypothesis testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
Conference_Location :
Austin, TX
Type :
conf
DOI :
10.1109/GlobalSIP.2013.6736855
Filename :
6736855
Link To Document :
بازگشت