Estimating Min-Entropy For Large Output Spaces
Darryl Buller, Aaron Kaufer Information Assurance Directorate National Security Agency
Output Spaces Darryl Buller, Aaron Kaufer Information Assurance - - PowerPoint PPT Presentation
Estimating Min-Entropy For Large Output Spaces Darryl Buller, Aaron Kaufer Information Assurance Directorate National Security Agency Overview Background Our goal Using Bayesian Networks Optimizing with a Genetic Algorithm
Darryl Buller, Aaron Kaufer Information Assurance Directorate National Security Agency
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Mixing Function Entropy Source Random Output
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
– Output space X is reasonably small – Sample size L is large enough to detect non-IID properties (if they exist)
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Pr 𝑦1, 𝑦2, 𝑦3, 𝑦4 = Pr 𝑦2 Pr 𝑦3 Pr 𝑦1 𝑦2, 𝑦3 Pr [𝑦4|𝑦1, 𝑦3]
𝑦2 𝑦1 𝑦3 𝑦4
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
candidate solutions
previous generation
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
– Each candidate is a binary nxn adjacency matrix – A(i,j) = 1 iff bit j is statistically dependent on bit i
1 1 1 1
𝑦2 𝑦1 𝑦3 𝑦4
Information Assurance Directorate // Confidence in Cyberspace
1 1 1 1
𝑦2 𝑦1 𝑦3 𝑦4
Information Assurance Directorate // Confidence in Cyberspace
– Randomly pick a crossover point – Join top part of one adjacency matrix and bottom part of the other, and vice-versa
2 1
A A
2 1
B B
2 1
A B
2 1
B A
Parents Children
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
k: # of free parameters N: # of sample outputs L: likelihood of observed samples given the BN
Information Assurance Directorate // Confidence in Cyberspace
1 1 1 1
𝑦2 𝑦1 𝑦3 𝑦4
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
25-29 18-22 11-15 4-8
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
1 12 10 8 7 6 5 4 3 14
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Information Assurance Directorate // Confidence in Cyberspace
Koller, D. and N. Friedman (2009). Probabilistic Graphical Models, Principles and Techniques. Cambridge, Massachusetts: The MIT Press.