CONSENSUAL DYNAMICS AND CHOQUET INTEGRAL IN AN ATTACK TREE-BASED FRAUD DETECTION SYSTEM

Alessandro Buoni, Mario Fedrizzi

2012

Abstract

In this paper we extend two modules of the multi-agent system FIDES (Fraud Interactive Detection Expert System) previously introduced in Buoni et al. (2011), and involving the attack tree representation of fraudulent attacks. First, assuming that the opinions of experts involved in the design of the attack tree are represented by fuzzy preference relations, we introduce a dynamical consensus model aiming at finding a shared representation of the attack tree. Second, assuming that the leaf nodes of the attack tree are attribute fuzzy numbers valued and that the attributes are interdependent, we show how to propagate the values up the tree through an aggregation process based on Choquet integral.

References

  1. Aumann R. J. (1965). Integrals of set-valued functions, Journal of Mathematical Analysis with Applications, 12, 1-12, 1965.
  2. Buoni, A., Fedrizzi, M., Mezei, J. (2010). A Delphi-based approach to fraud detection using attack trees and fuzzy numbers. In Proceeding of the International Association for Scientific Knowledege. Oviedo, November 8-10.E-Alt & InterTic.
  3. Buoni, A., Fedrizzi, M., Mezei, J. (2011). Combining attack trees and fuzzy numbers in a multi-agent approach to fraud detection, International Journal of Electronic Business (forthcoming).
  4. Choquet G. (1953). Theory of capacities, Annales de l'Institut Fourier, 5, 131-295.
  5. Chou, C.L-Y, Du, T., Lai, S. V, (2007), Continuous auditing with a multi-agent system. Decision Support Systems, 42 (4) 2274-2292.
  6. Dubois, D. and Prade, H., (1987).Fuzzy numbers: An overview, Analysis of Fuzzy Information - Vol. I: Mathematics and Logic, J. Bezdek, ed., CRC Press, Boca Raton, 3-39.
  7. Kacprzyk, J. and Fedrizzi, M. (1988). A “soft” measure of consensus in the setting of partial (fuzzy) preferences. European Journal of Operational Research, 34, 316- 325.
  8. Fedrizzi, M., Fedrizzi, M., and Marques Pereira, R. A. (1999). Soft consensus and network dynamics in group decision making. International Journal of Intelligent Systems, 14, 63-77.
  9. Gordon, T. J. (1994). The Delphi method in futures research methodology. AC/UNU Millenium Project, Washington, AC/UNU.
  10. Grabisch M., Nguyen H. T., Walker E. A. (1995). Fundamentals of Uncertainty Calculi, with Applications to Fuzzy Inference. Kluwer, Boston, MA.
  11. Grabisch, M., Labreuche (2010). A decade of application of the Choquet and Sugeno integrals in multi-criteria decision aid, Annals of Operations Research, 175, 247-286.
  12. Hand, D. J. (2007). Statistical techniques for fraud detection and evaluation. Available at: <http://lang tech.jrc.ec.europa.eu/mmdss2007/htdocs/Presentations /Docs/MMDSS_Hand_PUBLIC.pdf.>
  13. KPMG Fraud survey (2009). Available at: <http://www. kpmginstitutes.com/aci/insights/2009/pdf/kpmg-fraudsurvey-2009.pdf>.
  14. Oxman, R. (2004). Think-maps: teaching design thinking in design education. Design Studies. Vol. 25, Number 1.
  15. Schneier, B. (1999). Attack trees. Available at: <http: //www.schneier.com/paper-attacktrees-ddjft.html>.
  16. Yager, R. R. (2006). OWA trees and their role in security modelling using attack trees. Information Sciences, 176, 2933-2959.
  17. Yang R., Wang Z., Heng P. A., and Leung K. S. (2005). Fuzzy numbers and fuzzification of the Choquet integral, Fuzzy Sets and Systems, 153, 95-113.
  18. Wang, D. G., Li, T., Liu, S. J. L, Liang, G., Zhao, K. (2008). An immune multi-agent system for network intrusion. Proceedings of the third International Symposium on Intelligence Computation and Applications, (LNCS 5370, Springer-Verlag Berlin Heidelberg), 436-445.
  19. Zadeh, L. (1978). Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems 1, 3-28.
  20. Zadeh, L. (1979). A theory of approximate reasoning. In Hayes, J., Michie, D., and Mikulich, L., editors, Machine Intelligence 9, Halsted Press, New York, 149-194.
  21. Zhang, L. S., Zhou, N., Wu, J. X. (2008). The fuzzy integrated evaluation of embedded system security. International Conference on Embedded Software and Systems, 157-162.
Download


Paper Citation


in Harvard Style

Buoni A. and Fedrizzi M. (2012). CONSENSUAL DYNAMICS AND CHOQUET INTEGRAL IN AN ATTACK TREE-BASED FRAUD DETECTION SYSTEM . In Proceedings of the 4th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-8425-95-9, pages 283-288. DOI: 10.5220/0003730602830288


in Bibtex Style

@conference{icaart12,
author={Alessandro Buoni and Mario Fedrizzi},
title={CONSENSUAL DYNAMICS AND CHOQUET INTEGRAL IN AN ATTACK TREE-BASED FRAUD DETECTION SYSTEM},
booktitle={Proceedings of the 4th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2012},
pages={283-288},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003730602830288},
isbn={978-989-8425-95-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - CONSENSUAL DYNAMICS AND CHOQUET INTEGRAL IN AN ATTACK TREE-BASED FRAUD DETECTION SYSTEM
SN - 978-989-8425-95-9
AU - Buoni A.
AU - Fedrizzi M.
PY - 2012
SP - 283
EP - 288
DO - 10.5220/0003730602830288