Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

02/07/2023
by   Arti Bandhana, et al.
0

The ongoing rise in cyberattacks and the lack of skilled professionals in the cybersecurity domain to combat these attacks show the need for automated tools capable of detecting an attack with good performance. Attackers disguise their actions and launch attacks that consist of multiple actions, which are difficult to detect. Therefore, improving defensive tools requires their calibration against a well-trained attacker. In this work, we propose a model of an attacking agent and environment and evaluate its performance using basic Q-Learning, Naive Q-learning, and DoubleQ-Learning, all of which are variants of Q-Learning. The attacking agent is trained with the goal of exfiltrating data whereby all the hosts in the network have a non-zero detection probability. Results show that the DoubleQ-Learning agent has the best overall performance rate by successfully achieving the goal in 70% of the interactions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/27/2022

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

DDoS attacks, also known as distributed denial of service (DDoS) attacks...
research
11/16/2020

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack

With the continuous improvement of attack methods, there are more and mo...
research
05/09/2023

Communication-Robust Multi-Agent Learning by Adaptable Auxiliary Multi-Agent Adversary Generation

Communication can promote coordination in cooperative Multi-Agent Reinfo...
research
11/01/2020

Primer – A Tool for Testing Honeypot Measures of Effectiveness

Honeypots are a deceptive technology used to capture malicious activity....
research
01/10/2023

Chatbots in a Honeypot World

Question-and-answer agents like ChatGPT offer a novel tool for use as a ...
research
11/23/2021

Realistic simulation of users for IT systems in cyber ranges

Generating user activity is a key capability for both evaluating securit...
research
02/26/2021

Yoneda Hacking: The Algebra of Attacker Actions

Our work focuses on modeling security of systems from their component-le...

Please sign up or login with your details

Forgot password? Click here to reset