A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model

Background, or systematic, risks are integral parts of many systems and models in insurance and finance. These risks can, for example, be economic in nature, or they can carry more technical connotations, such as errors or intrusions, which could be intentional or unintentional. A most natural question arises from the practical point of view: is the given system really affected by these risks? In this paper we offer an algorithm for answering this question, given input-output data and appropriately constructed statistics, which rely on the order statistics of inputs and the concomitants of outputs. Even though the idea is rooted in complex statistical and probabilistic considerations, the algorithm is easy to implement and use in practice, as illustrated using simulated data.

[1]  Ruodu Wang,et al.  Gini-Type Measures of Risk and Variability: Gini Shortfall, Capital Allocations, and Heavy-Tailed Risks , 2016 .

[2]  Harris Schlesinger,et al.  Risk taking with additive and multiplicative background risks , 2011, J. Econ. Theory.

[3]  Takashi Onoda Probabilistic models-based intrusion detection using sequence characteristics in control system communication , 2015, Neural Computing and Applications.

[4]  Rivcardas Zitikis,et al.  Assessing Transfer Functions in Control Systems , 2018, Journal of Statistical Theory and Practice.

[5]  Takashi Onoda Probabilistic Models Based Intrusion Detection Using Sequence Characteristics in Control System Communication , 2014, EANN.

[6]  Edward Furman,et al.  On a Multiplicative Multivariate Gamma Distribution With Applications in Insurance , 2018, Risks.

[7]  G. Giorgi A fresh look at the topical interest of the Gini concentration ratio , 2005 .

[8]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[9]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[10]  Javier Perote Peña,et al.  Strategy-Proof Estimators for Simple Regression , 2003 .

[11]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[12]  David C. Nachman Preservation of "more risk averse" under expectations , 1982 .

[13]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[14]  Edward Furman,et al.  Multiple risk factor dependence structures: Distributional properties , 2016, 1607.04739.

[15]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[16]  M. Scarsini,et al.  On risk aversion with two risks , 1999 .

[17]  Lixing Zhu,et al.  Mean–variance, mean–VaR, and mean–CVaR models for portfolio selection with background risk , 2018, Risk Management.

[18]  Y. Davydov,et al.  Estimating the Index of Increase via Balancing Deterministic and Random Data , 2017, Mathematical Methods of Statistics.

[19]  Harris Schlesinger,et al.  Multiplicative Background Risk , 2006, Manag. Sci..

[20]  Lixing Zhu,et al.  The two-moment decision model with additive risks , 2017 .

[21]  John W. Pratt,et al.  Aversion to one risk in the presence of others , 1988 .

[22]  Youri Davydov,et al.  Quantifying non-monotonicity of functions and the lack of positivity in signed measures , 2017, 1705.02742.

[23]  Ričardas Zitikis,et al.  Weighted risk capital allocations in the presence of systematic risk , 2017 .

[24]  Javier Perote,et al.  Strategic behavior in regressions: an experimental study , 2015 .

[25]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.