SlideShare a Scribd company logo
1 of 8
Download to read offline
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Secure and Safe Internet ofThings (SerIoT)
1 Horizon 2020, Project No. 780139
20.01.2021
Hypothesis testing module
Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis testing Tool (1/2)
2 Horizon 2020, Project No. 780139
The Hypothesis testing module allows the security operator to investigate how
changing mitigation actions affects various KPI and if the KPI resulting from the
modification are statistically different when compared to those occurring from a
starting mitigation action set.
General concept: Τhe KPI values resulting from different mitigation strategies are
used to create clusters by employing a machine learning algorithm. The difference
between these clusters is evaluated by means of a p-value provided by statistical
method.
The tool uses the serIoT Mitigation Engine component as a basis, in terms of KPI
used.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis testing Tool (2/2)
3 Horizon 2020, Project No. 780139
 The tool answers the following question "Are two clusters of mitigation actions
𝐶𝐴 or 𝐶𝐵 different in terms of their underlying distribution and is this
difference statistically significant?".
 This can be formed as a hypothesis :
 𝐻0 The clusters come from the same distribution (𝑝≤0.05) or
 𝐻1 The clusters come from a different distribution (𝑝≥0.05).
 The HDBSCAN machine learning algorithm is used to cluster the mitigation
actions while a method called Statistical Significance of Clustering using Soft
Thresholding is used to assess the difference.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
High level overview of module operation
Horizon 2020, Project No. 780139
4
1. The operator can modifies existing or adds new mitigation actions via the Visual analytics module.
2. The hypothesis testing tool a) calculates KPI values for new and existing mitigations and b) a HDBSCAN
clustering model trained on historical data.
3. The clustering model is applied to see to which clusters, the existing and new mitigations belong to.
4. The SigClust model is applied and the comparison results along with a p-value become available to the
operator.
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
KPIs used for Clustering
5 Horizon 2020, Project No. 780139
 Common Vulnerability Scoring System (CVSS) is an Industry standard for
assessing the severity of a cybersecurity vulnerability.
 Return on response investment (RORI) is tool used to calculate (a self-named) an
index associated to the mitigation actions composing a response plan.
 The Vulnerabilities Surface Coverage (VSC) or Vulnerability Coverage of a
countermeasure cm, is found by counting the number of vulnerabilities it covers.
 The Deployment Cost KPI considers deployment time, consumed resources and
the importance of the device that deploys the countermeasure as assessed by the
network security operator .
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Experimental results
6 Horizon 2020, Project No. 780139
Results of proposed method
Ground Truth
Assessment
Same Cluster Different Cluster Accuracy
Same Cluster 8 1 95.74%
Different
Cluster
1 36
Results of Jackstraw* method
Ground Truth
Assessment
Same Cluster Different Cluster Accuracy
Same Cluster 9 0 89.13%
Different
Cluster
5 32
• An experiment was performed with a dataset of 6300
instances.
• The cluster resulted to 10 dense Clusters of KPI values
(shown in figure).
• The proposed method outperforms a SoA method by
≈6% accuracy in correctly assessing Cluster
membership
*N.C. Chung (2020), “Statistical significance of cluster membership for
unsupervised evaluation of cell identities”, Bioinformatics, Volume 36,
Issue 10, 3107:3114
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Hypothesis Testing Integration with
Visual Analytics Dashboard
7 Horizon 2020, Project No. 780139
Current and
modified
mitigation
KPI values
Modified
mitigation
actions can be
directly applied
to the network
Existing
mitigation
actions are
modified or new
added by clicking
a device
This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
8 Horizon 2020, Project No. 780139
 SerIoT project (2020), Deliverable ‘D4.5. Unsupervised IoT-ready engine for threat
mitigation’
- Hypothesis Testing
 Huang H, Liu Y, Yuan M, Marron JS (2015). Statistical Significance of Clustering using Soft
Thresholding. J Comput Graph Stat.. Volume 24, issue 4.
 L. McInnes, J. Healy, S. Astels,(2017). “hdbscan: Hierarchical density based clustering In: Journal of
Open Source Software”, The Open Journal, volume 2, number 11.
Related Publications

More Related Content

What's hot

SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT project
 
SerIoT Traffic Generator and Detector of malicious traffic patterns
SerIoT Traffic Generator and  Detector of malicious traffic patternsSerIoT Traffic Generator and  Detector of malicious traffic patterns
SerIoT Traffic Generator and Detector of malicious traffic patternsHITSerIoTProject
 
SerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT project
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentationMEDINA
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...MEDINA
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSMaitena Ilardia
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
Mycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsMycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsTomáš Pitner
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project PresentationNicolás Notario
 
Geant cloud peering-v2
Geant cloud peering-v2Geant cloud peering-v2
Geant cloud peering-v2Archiver
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...The Research Council of Norway, IKTPLUSS
 

What's hot (17)

SerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigationSerIoT Unsupervised IoT-ready Engine for threat mitigation
SerIoT Unsupervised IoT-ready Engine for threat mitigation
 
SerIoT Traffic Generator and Detector of malicious traffic patterns
SerIoT Traffic Generator and  Detector of malicious traffic patternsSerIoT Traffic Generator and  Detector of malicious traffic patterns
SerIoT Traffic Generator and Detector of malicious traffic patterns
 
SerIoT Traffic Generator Module
SerIoT Traffic Generator ModuleSerIoT Traffic Generator Module
SerIoT Traffic Generator Module
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentation
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
Mycroft CEP Technology and Aplications
Mycroft CEP Technology and AplicationsMycroft CEP Technology and Aplications
Mycroft CEP Technology and Aplications
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Nfv
NfvNfv
Nfv
 
ARIES Project Presentation
ARIES Project PresentationARIES Project Presentation
ARIES Project Presentation
 
Geant cloud peering-v2
Geant cloud peering-v2Geant cloud peering-v2
Geant cloud peering-v2
 
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
CSA Cloud Trust Protocol and A4Cloud: Enforcing cloud accountability through ...
 
6g intro slides_aravantinos
6g intro slides_aravantinos6g intro slides_aravantinos
6g intro slides_aravantinos
 
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
CDE Marketplace Sept 2016: Crypta Labs (CDE projects)
 

Similar to SerIot Hypothesis Testing Module

Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersDimitrios Amaxilatis
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)Sergio Potenciano Menci
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...ATMOSPHERE .
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapSergio Potenciano Menci
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportALi Baker
 
Precision crop management
Precision crop managementPrecision crop management
Precision crop managementIoF2020
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIROpen Knowledge Belgium
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET Journal
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 
Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Anna Gomez
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
 
H2020 big data and fiware an d iot
H2020 big data and fiware an d iotH2020 big data and fiware an d iot
H2020 big data and fiware an d iotWirelessInfo
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTIRJET Journal
 
OCAROIoT Objectives
OCAROIoT ObjectivesOCAROIoT Objectives
OCAROIoT ObjectivesATMOSPHERE .
 
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...Citadelh2020
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 

Similar to SerIot Hypothesis Testing Module (20)

Organicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to ExperimentersOrganicity Smartphone experimentation - Guide to Experimenters
Organicity Smartphone experimentation - Guide to Experimenters
 
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: WhirlpoolFIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
FIWARE Global Summit - Industry 4.0 Lombardy Champion Showcase: Whirlpool
 
InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)InteGrid SRA & Replication Roadmap (02/06/2020)
InteGrid SRA & Replication Roadmap (02/06/2020)
 
2019 04-08 hopu-aj
2019 04-08 hopu-aj2019 04-08 hopu-aj
2019 04-08 hopu-aj
 
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
A Proposal to Apply a Risk Assessment Methodology for IoT Systems to a Smart ...
 
InteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication RoadmapInteGrid Scalability & Replicability results and Replication Roadmap
InteGrid Scalability & Replicability results and Replication Roadmap
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
 
Precision crop management
Precision crop managementPrecision crop management
Precision crop management
 
Participatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIRParticipatory processes for air quality measurements through hackAIR
Participatory processes for air quality measurements through hackAIR
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural Network
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 
Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...Integrated security plan for medical device software: scalability and the lif...
Integrated security plan for medical device software: scalability and the lif...
 
IBM Think Milano
IBM Think MilanoIBM Think Milano
IBM Think Milano
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
 
H2020 big data and fiware an d iot
H2020 big data and fiware an d iotH2020 big data and fiware an d iot
H2020 big data and fiware an d iot
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
 
OCAROIoT Objectives
OCAROIoT ObjectivesOCAROIoT Objectives
OCAROIoT Objectives
 
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
ICTS ENABLE THE UNDERSTANDING AND TRANSFORMATION OF THE EUROPEAN PUBLIC ADMIN...
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 

SerIot Hypothesis Testing Module

  • 1. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Secure and Safe Internet ofThings (SerIoT) 1 Horizon 2020, Project No. 780139 20.01.2021 Hypothesis testing module Information Technologies Institute, Centre of Research and Technology Hellas (CERTH/ITI)
  • 2. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis testing Tool (1/2) 2 Horizon 2020, Project No. 780139 The Hypothesis testing module allows the security operator to investigate how changing mitigation actions affects various KPI and if the KPI resulting from the modification are statistically different when compared to those occurring from a starting mitigation action set. General concept: Τhe KPI values resulting from different mitigation strategies are used to create clusters by employing a machine learning algorithm. The difference between these clusters is evaluated by means of a p-value provided by statistical method. The tool uses the serIoT Mitigation Engine component as a basis, in terms of KPI used.
  • 3. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis testing Tool (2/2) 3 Horizon 2020, Project No. 780139  The tool answers the following question "Are two clusters of mitigation actions 𝐶𝐴 or 𝐶𝐵 different in terms of their underlying distribution and is this difference statistically significant?".  This can be formed as a hypothesis :  𝐻0 The clusters come from the same distribution (𝑝≤0.05) or  𝐻1 The clusters come from a different distribution (𝑝≥0.05).  The HDBSCAN machine learning algorithm is used to cluster the mitigation actions while a method called Statistical Significance of Clustering using Soft Thresholding is used to assess the difference.
  • 4. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 High level overview of module operation Horizon 2020, Project No. 780139 4 1. The operator can modifies existing or adds new mitigation actions via the Visual analytics module. 2. The hypothesis testing tool a) calculates KPI values for new and existing mitigations and b) a HDBSCAN clustering model trained on historical data. 3. The clustering model is applied to see to which clusters, the existing and new mitigations belong to. 4. The SigClust model is applied and the comparison results along with a p-value become available to the operator.
  • 5. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 KPIs used for Clustering 5 Horizon 2020, Project No. 780139  Common Vulnerability Scoring System (CVSS) is an Industry standard for assessing the severity of a cybersecurity vulnerability.  Return on response investment (RORI) is tool used to calculate (a self-named) an index associated to the mitigation actions composing a response plan.  The Vulnerabilities Surface Coverage (VSC) or Vulnerability Coverage of a countermeasure cm, is found by counting the number of vulnerabilities it covers.  The Deployment Cost KPI considers deployment time, consumed resources and the importance of the device that deploys the countermeasure as assessed by the network security operator .
  • 6. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Experimental results 6 Horizon 2020, Project No. 780139 Results of proposed method Ground Truth Assessment Same Cluster Different Cluster Accuracy Same Cluster 8 1 95.74% Different Cluster 1 36 Results of Jackstraw* method Ground Truth Assessment Same Cluster Different Cluster Accuracy Same Cluster 9 0 89.13% Different Cluster 5 32 • An experiment was performed with a dataset of 6300 instances. • The cluster resulted to 10 dense Clusters of KPI values (shown in figure). • The proposed method outperforms a SoA method by ≈6% accuracy in correctly assessing Cluster membership *N.C. Chung (2020), “Statistical significance of cluster membership for unsupervised evaluation of cell identities”, Bioinformatics, Volume 36, Issue 10, 3107:3114
  • 7. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 Hypothesis Testing Integration with Visual Analytics Dashboard 7 Horizon 2020, Project No. 780139 Current and modified mitigation KPI values Modified mitigation actions can be directly applied to the network Existing mitigation actions are modified or new added by clicking a device
  • 8. This project has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No. 780139 8 Horizon 2020, Project No. 780139  SerIoT project (2020), Deliverable ‘D4.5. Unsupervised IoT-ready engine for threat mitigation’ - Hypothesis Testing  Huang H, Liu Y, Yuan M, Marron JS (2015). Statistical Significance of Clustering using Soft Thresholding. J Comput Graph Stat.. Volume 24, issue 4.  L. McInnes, J. Healy, S. Astels,(2017). “hdbscan: Hierarchical density based clustering In: Journal of Open Source Software”, The Open Journal, volume 2, number 11. Related Publications