Deep hierarchical reinforcement agents for automated penetration testing

09/14/2021
by   Khuong Tran, et al.
18

Penetration testing the organised attack of a computer system in order to test existing defences has been used extensively to evaluate network security. This is a time consuming process and requires in-depth knowledge for the establishment of a strategy that resembles a real cyber-attack. This paper presents a novel deep reinforcement learning architecture with hierarchically structured agents called HA-DRL, which employs an algebraic action decomposition strategy to address the large discrete action space of an autonomous penetration testing simulator where the number of actions is exponentially increased with the complexity of the designed cybersecurity network. The proposed architecture is shown to find the optimal attacking policy faster and more stably than a conventional deep Q-learning agent which is commonly used as a method to apply artificial intelligence in automatic penetration testing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/15/2019

Autonomous Penetration Testing using Reinforcement Learning

Penetration testing (pentesting) involves performing a controlled attack...
research
09/14/2023

On Autonomous Agents in a Cyber Defence Environment

Autonomous Cyber Defence is required to respond to high-tempo cyber-atta...
research
06/15/2022

Search-Based Testing Approach for Deep Reinforcement Learning Agents

Deep Reinforcement Learning (DRL) algorithms have been increasingly empl...
research
06/09/2021

Reinforcement Learning for Industrial Control Network Cyber Security Orchestration

Defending computer networks from cyber attack requires coordinating acti...
research
07/26/2019

Action Semantics Network: Considering the Effects of Actions in Multiagent Systems

In multiagent systems (MASs), each agent makes individual decisions but ...
research
11/03/2021

Autonomous Attack Mitigation for Industrial Control Systems

Defending computer networks from cyber attack requires timely responses ...
research
08/20/2021

Crown Jewels Analysis using Reinforcement Learning with Attack Graphs

Cyber attacks pose existential threats to nations and enterprises. Curre...

Please sign up or login with your details

Forgot password? Click here to reset