SlideShare a Scribd company logo
1 of 8
Download to read offline
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Secure and Safe Internet ofThings (SerIoT)
1 Horizon 2020, Project No. 780139
20.01.2021
Hypothesis testing module
Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis testing Tool (1/2)
2 Horizon 2020, Project No. 780139
The Hypothesis testing module allows the security operator to investigate how
changing mitigation actions affects various KPI and if the KPI resulting from the
modification are statistically different when compared to those occurring from a
starting mitigation action set.
General concept: Τhe KPI values resulting from different mitigation strategies are
used to create clusters by employing a machine learning algorithm. The difference
between these clusters is evaluated by means of a p-value provided by statistical
method.
The tool uses the serIoT Mitigation Engine component as a basis, in terms of KPI
used.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis testing Tool (2/2)
3 Horizon 2020, Project No. 780139
 The tool answers the following question "Are two clusters of mitigation actions
𝐶𝐴 or 𝐶𝐵 different in terms of their underlying distribution and is this
difference statistically significant?".
 This can be formed as a hypothesis :
 𝐻0 The clusters come from the same distribution (𝑝≤0.05) or
 𝐻1 The clusters come from a different distribution (𝑝≥0.05).
 The HDBSCAN machine learning algorithm is used to cluster the mitigation
actions while a method called Statistical Significance of Clustering using Soft
Thresholding is used to assess the difference.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
High level overview of module operation
Horizon 2020, Project No. 780139
4
1. The operator can modifies existing or adds new mitigation actions via the Visual analytics module.
2. The hypothesis testing tool a) calculates KPI values for new and existing mitigations and b) a HDBSCAN
clustering model trained on historical data.
3. The clustering model is applied to see to which clusters, the existing and new mitigations belong to.
4. The SigClust model is applied and the comparison results along with a p-value become available to the
operator.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
KPIs used for Clustering
5 Horizon 2020, Project No. 780139
 Common Vulnerability Scoring System (CVSS) is an Industry standard for
assessing the severity of a cybersecurity vulnerability.
 Return on response investment (RORI) is tool used to calculate (a self-named) an
index associated to the mitigation actions composing a response plan.
 The Vulnerabilities Surface Coverage (VSC) or Vulnerability Coverage of a
countermeasure cm, is found by counting the number of vulnerabilities it covers.
 The Deployment Cost KPI considers deployment time, consumed resources and
the importance of the device that deploys the countermeasure as assessed by the
network security operator .
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Experimental results
6 Horizon 2020, Project No. 780139
Results of proposed method
Ground Truth
Assessment
Same Cluster Different Cluster Accuracy
Same Cluster 8 1 95.74%
Different
Cluster
1 36
Results of Jackstraw* method
Ground Truth
Assessment
Same Cluster Different Cluster Accuracy
Same Cluster 9 0 89.13%
Different
Cluster
5 32
• An experiment was performed with a dataset of 6300
instances.
• The cluster resulted to 10 dense Clusters of KPI values
(shown in figure).
• The proposed method outperforms a SoA method by
≈6% accuracy in correctly assessing Cluster
membership
*N.C. Chung (2020), “Statistical significance of cluster membership for
unsupervised evaluation of cell identities”, Bioinformatics, Volume 36,
Issue 10, 3107:3114
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis Testing Integration with
Visual Analytics Dashboard
7 Horizon 2020, Project No. 780139
Current and
modified
mitigation
KPI values
Modified
mitigation
actions can be
directly applied
to the network
Existing
mitigation
actions are
modified or new
added by clicking
a device
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
8 Horizon 2020, Project No. 780139
 SerIoT project (2020), Deliverable ‘D4.5. Unsupervised IoT-ready engine for threat
mitigation’
- Hypothesis Testing
 Huang H, Liu Y, Yuan M, Marron JS (2015). Statistical Significance of Clustering using Soft
Thresholding. J Comput Graph Stat.. Volume 24, issue 4.
 L. McInnes, J. Healy, S. Astels,(2017). “hdbscan: Hierarchical density based clustering In: Journal of
Open Source Software”, The Open Journal, volume 2, number 11.
Related Publications

More Related Content

What's hot

SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT project
 
SerIoT Traffic Generator and Detector of malicious traffic patterns
SerIoT Traffic Generator and  Detector of malicious traffic patternsSerIoT Traffic Generator and  Detector of malicious traffic patterns
SerIoT Traffic Generator and Detector of malicious traffic patternsHITSerIoTProject
 
SerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT project
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentationMEDINA
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...MEDINA
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSMaitena Ilardia
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
Mycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsMycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsTomáš Pitner
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project PresentationNicolás Notario
 
Geant cloud peering-v2
Geant cloud peering-v2Geant cloud peering-v2
Geant cloud peering-v2Archiver
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...The Research Council of Norway, IKTPLUSS
 

What's hot (17)

SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigation
 
SerIoT Traffic Generator and Detector of malicious traffic patterns
SerIoT Traffic Generator and  Detector of malicious traffic patternsSerIoT Traffic Generator and  Detector of malicious traffic patterns
SerIoT Traffic Generator and Detector of malicious traffic patterns
 
SerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT Traffic Generator Module
SerIoT Traffic Generator Module
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentation
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
Mycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsMycroft CEP Technology and Aplications
Mycroft CEP Technology and Aplications
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Nfv
NfvNfv
Nfv
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project Presentation
 
Geant cloud peering-v2
Geant cloud peering-v2Geant cloud peering-v2
Geant cloud peering-v2
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
 
6g intro slides_aravantinos
6g intro slides_aravantinos6g intro slides_aravantinos
6g intro slides_aravantinos
 
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
 

Similar to SerIot Hypothesis Testing Module

Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersDimitrios Amaxilatis
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)Sergio Potenciano Menci
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...ATMOSPHERE .
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapSergio Potenciano Menci
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportALi Baker
 
Precision crop management
Precision crop managementPrecision crop management
Precision crop managementIoF2020
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIROpen Knowledge Belgium
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET Journal
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Anna Gomez
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
 
H2020 big data and fiware an d iot
H2020 big data and fiware an d iotH2020 big data and fiware an d iot
H2020 big data and fiware an d iotWirelessInfo
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTIRJET Journal
 
OCAROIoT Objectives
OCAROIoT ObjectivesOCAROIoT Objectives
OCAROIoT ObjectivesATMOSPHERE .
 
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...Citadelh2020
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 

Similar to SerIot Hypothesis Testing Module (20)

Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to Experimenters
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)
 
2019 04-08 hopu-aj
2019 04-08 hopu-aj2019 04-08 hopu-aj
2019 04-08 hopu-aj
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication Roadmap
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
 
Precision crop management
Precision crop managementPrecision crop management
Precision crop management
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIR
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural Network
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...
 
IBM Think Milano
IBM Think MilanoIBM Think Milano
IBM Think Milano
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
 
H2020 big data and fiware an d iot
H2020 big data and fiware an d iotH2020 big data and fiware an d iot
H2020 big data and fiware an d iot
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
 
OCAROIoT Objectives
OCAROIoT ObjectivesOCAROIoT Objectives
OCAROIoT Objectives
 
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 

Recently uploaded

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 

Recently uploaded (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 

SerIot Hypothesis Testing Module

  • 1. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Secure and Safe Internet ofThings (SerIoT) 1 Horizon 2020, Project No. 780139 20.01.2021 Hypothesis testing module Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
  • 2. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis testing Tool (1/2) 2 Horizon 2020, Project No. 780139 The Hypothesis testing module allows the security operator to investigate how changing mitigation actions affects various KPI and if the KPI resulting from the modification are statistically different when compared to those occurring from a starting mitigation action set. General concept: Τhe KPI values resulting from different mitigation strategies are used to create clusters by employing a machine learning algorithm. The difference between these clusters is evaluated by means of a p-value provided by statistical method. The tool uses the serIoT Mitigation Engine component as a basis, in terms of KPI used.
  • 3. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis testing Tool (2/2) 3 Horizon 2020, Project No. 780139  The tool answers the following question "Are two clusters of mitigation actions 𝐶𝐴 or 𝐶𝐵 different in terms of their underlying distribution and is this difference statistically significant?".  This can be formed as a hypothesis :  𝐻0 The clusters come from the same distribution (𝑝≤0.05) or  𝐻1 The clusters come from a different distribution (𝑝≥0.05).  The HDBSCAN machine learning algorithm is used to cluster the mitigation actions while a method called Statistical Significance of Clustering using Soft Thresholding is used to assess the difference.
  • 4. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 High level overview of module operation Horizon 2020, Project No. 780139 4 1. The operator can modifies existing or adds new mitigation actions via the Visual analytics module. 2. The hypothesis testing tool a) calculates KPI values for new and existing mitigations and b) a HDBSCAN clustering model trained on historical data. 3. The clustering model is applied to see to which clusters, the existing and new mitigations belong to. 4. The SigClust model is applied and the comparison results along with a p-value become available to the operator.
  • 5. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 KPIs used for Clustering 5 Horizon 2020, Project No. 780139  Common Vulnerability Scoring System (CVSS) is an Industry standard for assessing the severity of a cybersecurity vulnerability.  Return on response investment (RORI) is tool used to calculate (a self-named) an index associated to the mitigation actions composing a response plan.  The Vulnerabilities Surface Coverage (VSC) or Vulnerability Coverage of a countermeasure cm, is found by counting the number of vulnerabilities it covers.  The Deployment Cost KPI considers deployment time, consumed resources and the importance of the device that deploys the countermeasure as assessed by the network security operator .
  • 6. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Experimental results 6 Horizon 2020, Project No. 780139 Results of proposed method Ground Truth Assessment Same Cluster Different Cluster Accuracy Same Cluster 8 1 95.74% Different Cluster 1 36 Results of Jackstraw* method Ground Truth Assessment Same Cluster Different Cluster Accuracy Same Cluster 9 0 89.13% Different Cluster 5 32 • An experiment was performed with a dataset of 6300 instances. • The cluster resulted to 10 dense Clusters of KPI values (shown in figure). • The proposed method outperforms a SoA method by ≈6% accuracy in correctly assessing Cluster membership *N.C. Chung (2020), “Statistical significance of cluster membership for unsupervised evaluation of cell identities”, Bioinformatics, Volume 36, Issue 10, 3107:3114
  • 7. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis Testing Integration with Visual Analytics Dashboard 7 Horizon 2020, Project No. 780139 Current and modified mitigation KPI values Modified mitigation actions can be directly applied to the network Existing mitigation actions are modified or new added by clicking a device
  • 8. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 8 Horizon 2020, Project No. 780139  SerIoT project (2020), Deliverable ‘D4.5. Unsupervised IoT-ready engine for threat mitigation’ - Hypothesis Testing  Huang H, Liu Y, Yuan M, Marron JS (2015). Statistical Significance of Clustering using Soft Thresholding. J Comput Graph Stat.. Volume 24, issue 4.  L. McInnes, J. Healy, S. Astels,(2017). “hdbscan: Hierarchical density based clustering In: Journal of Open Source Software”, The Open Journal, volume 2, number 11. Related Publications