Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

04/07/2022
by   Diksha Goel, et al.
7

Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize their chance of successfully reaching the destination before getting detected. The defender's task is to block a constant number of edges to decrease the attacker's chance of success. We show that the problem is #P-hard and, therefore, intractable to solve exactly. We convert the attacker's problem to an exponential sized Dynamic Program that is approximated by a Neural Network (NN). Once trained, the NN provides an efficient fitness function for the defender's Evolutionary Diversity Optimisation (EDO). The diversity emphasis on the defender's solution provides a diverse set of training samples, which improves the training accuracy of our NN for modelling the attacker. We go back and forth between NN training and EDO. Experimental results show that for R500 graph, our proposed EDO based defense is less than 1 optimal defense.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/02/2022

Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs

Active Directory (AD) is the default security management system for Wind...
research
04/08/2023

Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems

We study a Stackelberg game between one attacker and one defender in a c...
research
12/25/2021

Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs

Active Directory is the default security management system for Windows d...
research
04/16/2018

Towards Robust Monitoring of Stealthy Diffusion

In this work, we introduce and study the (α, β)-Monitoring game on netwo...
research
11/05/2022

Stateful Detection of Adversarial Reprogramming

Adversarial reprogramming allows stealing computational resources by rep...
research
08/29/2018

Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems

In this paper, a novel anti-jamming mechanism is proposed to analyze and...

Please sign up or login with your details

Forgot password? Click here to reset