A Generalized Associative Petri Net for Reasoning

Although Bayesian networks (BNs) are increasingly being used to solve real-world risk problems, their use is still constrained by the difficulty of constructing the node probability tables (NPTs). A key challenge is to construct relevant NPTs using the minimal amount of expert elicitation, recognizing that it is rarely cost effective to elicit complete sets of probability values. We describe a simple approach to defining NPTs for a large class of commonly occurring nodes (called ranked nodes). The approach is based on the doubly truncated normal distribution with a central tendency that is invariably a type of weighted function of the parent nodes. In extensive real-world case studies, we have found that this approach is sufficient for generating the NPTs of a very large class of nodes. We describe one such case study for validation purposes. The approach has been fully automated in a commercial tool, called AgenaRisk, and is thus accessible to all types of domain experts. We believe that this work represents a useful contribution to the BN research and technology, since its application makes the difference between being able to build realistic BN models and not.

[1]  Carl G. Looney Fuzzy Petri Nets and Applications , 1994 .

[2]  Jin-Fu Chang,et al.  Knowledge Representation Using Fuzzy Petri Nets , 1990, IEEE Trans. Knowl. Data Eng..

[3]  Hsiu-Sen Chiang,et al.  E-mail viruses: how organizations can protect their e-mails , 2004, Online Inf. Rev..

[4]  Asunción Gómez-Pérez,et al.  Methodologies, tools and languages for building ontologies: Where is their meeting point? , 2003, Data Knowl. Eng..

[5]  Donald Michie,et al.  Machine learning of rules and trees , 1995 .

[6]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[7]  Jose Manuel Corera,et al.  Building and Reusing Ontologies for Electrical Network Applications , 1996, ECAI.

[8]  rey O. Kephart,et al.  Automatic Extraction of Computer Virus SignaturesJe , 2006 .

[9]  David C. Yen,et al.  Classification methods in the detection of new malicious emails , 2005, Inf. Sci..

[10]  Xiaoou Li,et al.  Dynamic knowledge inference and learning under adaptive fuzzy Petri net framework , 2000, IEEE Trans. Syst. Man Cybern. Part C.

[11]  Riichiro Mizoguchi Tutorial on Ontological Engineering: Part 1: Introduction to Ontological Engineering. , 2003 .

[12]  Karl N. Levitt,et al.  MCF: a malicious code filter , 1995, Comput. Secur..

[13]  Carlos Flavián,et al.  Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..

[14]  B. C. Vickery,et al.  Ontologies , 1997, J. Inf. Sci..

[15]  Sangkyun Kim,et al.  Enterprise security architecture in business convergence environments , 2005, Ind. Manag. Data Syst..

[16]  Daniel S. Yeung,et al.  A multilevel weighted fuzzy reasoning algorithm for expert systems , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[17]  Austin Tate,et al.  Guest Editors' Introduction: Ontologies , 1999 .

[18]  Michael Gruninger,et al.  Methodology for the Design and Evaluation of Ontologies , 1995, IJCAI 1995.

[19]  Gary McGraw,et al.  Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.

[20]  Douglas B. Lenat,et al.  CYC: a large-scale investment in knowledge infrastructure , 1995, CACM.

[21]  Vijayan Sugumaran,et al.  Ontologies for conceptual modeling: their creation, use, and management , 2002, Data Knowl. Eng..

[22]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[23]  Zoubida Kedad,et al.  Dealing with Semantic Heterogeneity During Data Integration , 1999, ER.

[24]  Ramanathan V. Guha,et al.  Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project , 1990 .

[25]  Hsiu-Sen Chiang,et al.  Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..

[26]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[27]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[28]  Martin L. King,et al.  Towards a Methodology for Building Ontologies , 1995 .

[29]  Karl N. Levitt,et al.  Automated assistance for detecting malicious code , 1993 .

[30]  Xiaoou Li,et al.  Adaptive fuzzy petri nets for dynamic knowledge representation and inference , 2000 .

[31]  Riichiro Mizoguchi,et al.  Part 1: Introduction to ontological engineering , 2003, New Generation Computing.

[32]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[33]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[34]  Witold Pedrycz,et al.  A generalized fuzzy Petri net model , 1994, IEEE Trans. Fuzzy Syst..

[35]  W. Pedrycz,et al.  OR/AND neuron in modeling fuzzy set connectives , 1994, IEEE Trans. Fuzzy Syst..

[36]  C. G. Looney,et al.  Logical controls via Boolean rule matrix transformations , 1987, IEEE Transactions on Systems, Man, and Cybernetics.

[37]  Kathleen Dahlgren,et al.  A linguistic ontology , 1995, Int. J. Hum. Comput. Stud..