Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning

04/15/2021
by   Lei Zhang, et al.
0

In this work, we present a learning-based approach to analysis cyberspace security configuration. Unlike prior methods, our approach has the ability to learn from past experience and improve over time. In particular, as we train over a greater number of agents as attackers, our method becomes better at discovering hidden attack paths for previously methods, especially in multi-domain cyberspace. To achieve these results, we pose discovering attack paths as a Reinforcement Learning (RL) problem and train an agent to discover multi-domain cyberspace attack paths. To enable our RL policy to discover more hidden attack paths and shorter attack paths, we ground representation introduction an multi-domain action select module in RL. Our objective is to discover more hidden attack paths and shorter attack paths by our proposed method, to analysis the weakness of cyberspace security configuration. At last, we designed a simulated cyberspace experimental environment to verify our proposed method, the experimental results show that our method can discover more hidden multi-domain attack paths and shorter attack paths than existing baseline methods.

READ FULL TEXT
research
07/09/2020

Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning

In this work, we present a learning-based approach to analysis cyberspac...
research
01/28/2022

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Reinforcement learning (RL), in conjunction with attack graphs and cyber...
research
05/27/2022

Tutorial on Course-of-Action (COA) Attack Search Methods in Computer Networks

In the literature of modern network security research, deriving effectiv...
research
06/01/2022

Discovering the Hidden Vocabulary of DALLE-2

We discover that DALLE-2 seems to have a hidden vocabulary that can be u...
research
06/20/2023

Analysis of the Benefits and Efficacy of the Addition of Variants and Reality Paths to the Blackboard Architecture

While the Blackboard Architecture has been in use since the 1980s, it ha...
research
11/06/2022

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Reinforcement learning (RL) operating on attack graphs leveraging cyber ...
research
08/16/2021

Using Cyber Terrain in Reinforcement Learning for Penetration Testing

Reinforcement learning (RL) has been applied to attack graphs for penetr...

Please sign up or login with your details

Forgot password? Click here to reset