by LR fuzzy numbers, we propose an algorithm for
aggregating these values using the Choquet integral,
whose distinguished feature is to be able to take into
account the interaction between nodes.
Future work will be devoted to the introduction
of case-based reasoning techniques combined with
multi criteria models to improve the joint evaluation
of risk and uncertainty of the attacks useful for
estimating the prevention costs.
REFERENCES
Aumann R. J. (1965). Integrals of set-valued functions,
Journal of Mathematical Analysis with Applications,
12, 1-12, 1965.
Buoni, A., Fedrizzi, M., Mezei, J. (2010). A Delphi-based
approach to fraud detection using attack trees and
fuzzy numbers. In Proceeding of the International
Association for Scientific Knowledege. Oviedo,
November 8-10.E-Alt & InterTic.
Buoni, A., Fedrizzi, M., Mezei, J. (2011). Combining
attack trees and fuzzy numbers in a multi-agent
approach to fraud detection, International Journal of
Electronic Business (forthcoming).
Choquet G. (1953). Theory of capacities, Annales de
l'Institut Fourier, 5, 131-295.
Chou, C.L-Y, Du, T., Lai, S. V, (2007), Continuous
auditing with a multi-agent system. Decision Support
Systems, 42 (4) 2274-2292.
Dubois, D. and Prade, H., (1987).Fuzzy numbers: An
overview, Analysis of Fuzzy Information - Vol. I:
Mathematics and Logic, J. Bezdek, ed., CRC Press,
Boca Raton, 3-39.
Kacprzyk, J. and Fedrizzi, M. (1988). A “soft” measure of
consensus in the setting of partial (fuzzy) preferences.
European Journal of Operational Research, 34, 316–
325.
Fedrizzi, M., Fedrizzi, M., and Marques Pereira, R. A.
(1999). Soft consensus and network dynamics in
group decision making. International Journal of
Intelligent Systems, 14, 63–77.
Gordon, T. J. (1994). The Delphi method in futures
research methodology. AC/UNU Millenium Project,
Washington, AC/UNU.
Grabisch M., Nguyen H. T., Walker E. A. (1995).
Fundamentals of Uncertainty Calculi, with
Applications to Fuzzy Inference. Kluwer, Boston,
MA.
Grabisch, M., Labreuche (2010). A decade of application
of the Choquet and Sugeno integrals in multi-criteria
decision aid, Annals of Operations Research, 175,
247-286.
Hand, D. J. (2007). Statistical techniques for fraud
detection and evaluation. Available at: <http://lang
tech.jrc.ec.europa.eu/mmdss2007/htdocs/Presentations
/Docs/MMDSS_Hand_PUBLIC.pdf.>
KPMG Fraud survey (2009). Available at: <http://www.
kpmginstitutes.com/aci/insights/2009/pdf/kpmg-fraud-
survey-2009.pdf>.
Oxman, R. (2004). Think-maps: teaching design thinking
in design education. Design Studies. Vol. 25, Number
1.
Schneier, B. (1999). Attack trees. Available at: <http:
//www.schneier.com/paper-attacktrees-ddjft.html>.
Yager, R. R. (2006). OWA trees and their role in security
modelling using attack trees. Information Sciences,
176, 2933-2959.
Yang R., Wang Z., Heng P. A., and Leung K. S. (2005).
Fuzzy numbers and fuzzification of the Choquet
integral, Fuzzy Sets and Systems, 153, 95-113.
Wang, D. G., Li, T., Liu, S. J. L, Liang, G., Zhao, K.
(2008). An immune multi-agent system for network
intrusion. Proceedings of the third International
Symposium on Intelligence Computation and
Applications, (LNCS 5370, Springer-Verlag Berlin
Heidelberg), 436-445.
Zadeh, L. (1978). Fuzzy sets as a basis for a theory of
possibility, Fuzzy Sets and Systems 1, 3-28.
Zadeh, L. (1979). A theory of approximate reasoning. In
Hayes, J., Michie, D., and Mikulich, L., editors,
Machine Intelligence 9, Halsted Press, New York,
149-194.
Zhang, L. S., Zhou, N., Wu, J. X. (2008). The fuzzy
integrated evaluation of embedded system security.
International Conference on Embedded Software and
Systems, 157-162.
ICAART 2012 - International Conference on Agents and Artificial Intelligence
288