Skip to main content

Logic, Machine Learning, and Security

  • Conference paper
  • First Online:
  • 652 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11529))

Abstract

Logic stands at the very heart of computer science. In this talk, I will argue that logic is also an essential part of machine learning and that it has a fundamental role to play in both international security and counter-terrorism. I will first briefly describe the use of logic for high-level reasoning in counter-terrorism applications and then describe the BEEF system to explain the forecasts generated by virtually any machine learning classifier. Finally, I will describe one use of logic in deceiving cyber-adversaries who may have successfully compromised an enterprise network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.dailystar.com.lb/News/Lebanon-News/2008/Oct-22/54721-us-academics-design-software-to-predict-hizbullah-behavior.ashx.

References

  1. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)

    Article  Google Scholar 

  2. Cortes, C., Vapnik, V.: Support vector machine. Mach. Learn. 20, 273–297 (1995)

    MATH  Google Scholar 

  3. Dekhtyar, A., Dekhtyar, M.I., Subrahmanian, V.: Temporal probabilistic logic programs. In: ICLP, vol. 99, pp. 109–123 (1999)

    Google Scholar 

  4. Grover, S., Pulice, C., Simari, G.I., Subrahmanian, V.: BEEF: balanced English explanations of forecasts. IEEE Trans. Comput. Soc. Syst. 6(2), 350–364 (2019)

    Article  Google Scholar 

  5. Jajodia, S., et al.: A probabilistic logic of cyber deception. IEEE Inf. Forensics Secur. 12(11), 2532–2544 (2017)

    Article  Google Scholar 

  6. Khuller, S., Martinez, M.V., Nau, D., Sliva, A., Simari, G.I., Subrahmanian, V.S.: Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10 30,000 worlds. Ann. Math. Artif. Intell. 51(2–4), 295–331 (2007)

    Article  MathSciNet  Google Scholar 

  7. Mannes, A., Michael, M., Pate, A., Sliva, A., Subrahmanian, V.S., Wilkenfeld, J.: Stochastic opponent modeling agents: a case study with Hezbollah. In: Liu, H., Salerno, J.J., Young, M.J. (eds.) Social Computing, Behavioral Modeling, and Prediction, pp. 37–45. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-77672-9_6

    Chapter  Google Scholar 

  8. Serra, E., Subrahmanian, V.: A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans. Comput. Soc. Syst. 1(1), 66–88 (2014)

    Article  Google Scholar 

  9. Simari, G.I., Dickerson, J.P., Sliva, A., Subrahmanian, V.: Parallel abductive query answering in probabilistic logic programs. ACM Trans. Comput. Logic (TOCL) 14(2), 12 (2013)

    Article  MathSciNet  Google Scholar 

  10. Subrahmanian, V.S., Mannes, A., Roul, A., Raghavan, R.: Indian Mujahideen: Computational Analysis and Public Policy. TESECO. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-02818-7

    Book  Google Scholar 

  11. Subrahmanian, V.S., Mannes, A., Sliva, A., Shakarian, J., Dickerson, J.P.: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. Springer, New York (2012). https://doi.org/10.1007/978-1-4614-4769-6

    Book  Google Scholar 

Download references

Acknowledgement

Different parts of this work were supported by ONR grants N000141612739, N00014-16-1-2918, N00014-18-1-2670 and N00014-16-1-2896.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Subrahmanian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subrahmanian, V.S. (2019). Logic, Machine Learning, and Security. In: Cuzzocrea, A., Greco, S., Larsen, H., Saccà, D., Andreasen, T., Christiansen, H. (eds) Flexible Query Answering Systems. FQAS 2019. Lecture Notes in Computer Science(), vol 11529. Springer, Cham. https://doi.org/10.1007/978-3-030-27629-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27629-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27628-7

  • Online ISBN: 978-3-030-27629-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics