Automating Privilege Escalation with Deep Reinforcement Learning

10/04/2021
by   Kalle Kujanpää, et al.
0

AI-based defensive solutions are necessary to defend networks and information assets against intelligent automated attacks. Gathering enough realistic data for training machine learning-based defenses is a significant practical challenge. An intelligent red teaming agent capable of performing realistic attacks can alleviate this problem. However, there is little scientific evidence demonstrating the feasibility of fully automated attacks using machine learning. In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents. We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation. Our results show that the autonomous agent can escalate privileges in a Windows 7 environment using a wide variety of different techniques depending on the environment configuration it encounters. Hence, our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2019

Snooping Attacks on Deep Reinforcement Learning

Adversarial attacks have exposed a significant security vulnerability in...
research
05/30/2022

Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning

We study data poisoning attacks on online deep reinforcement learning (D...
research
02/17/2023

Deep Reinforcement Learning for mmWave Initial Beam Alignment

We investigate the applicability of deep reinforcement learning algorith...
research
07/25/2019

Interactive Lungs Auscultation with Reinforcement Learning Agent

To perform a precise auscultation for the purposes of examination of res...
research
06/06/2022

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

The cybersecurity threat landscape has lately become overly complex. Thr...
research
04/17/2023

Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations

We implemented and evaluated an automated cyber defense agent. The agent...
research
11/03/2021

Autonomous Attack Mitigation for Industrial Control Systems

Defending computer networks from cyber attack requires timely responses ...

Please sign up or login with your details

Forgot password? Click here to reset