Intrusion Prevention through Optimal Stopping

10/30/2021
by   Kim Hammar, et al.
0

We study automated intrusion prevention using reinforcement learning. Following a novel approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping problem. This formulation gives us insight into the structure of optimal policies, which we show to have threshold properties. For most practical cases, it is not feasible to obtain an optimal defender policy using dynamic programming. We therefore develop a reinforcement learning approach to approximate an optimal policy. Our method for learning and validating policies includes two systems: a simulation system where defender policies are incrementally learned and an emulation system where statistics are produced that drive simulation runs and where learned policies are evaluated. We show that our approach can produce effective defender policies for a practical IT infrastructure of limited size. Inspection of the learned policies confirms that they exhibit threshold properties.

READ FULL TEXT

page 11

page 12

research
06/14/2021

Learning Intrusion Prevention Policies through Optimal Stopping

We study automated intrusion prevention using reinforcement learning. In...
research
04/03/2022

A System for Interactive Examination of Learned Security Policies

We present a system for interactive examination of learned security poli...
research
03/25/2022

Randomized Policy Optimization for Optimal Stopping

Optimal stopping is the problem of determining when to stop a stochastic...
research
02/05/2016

Active Information Acquisition

We propose a general framework for sequential and dynamic acquisition of...
research
01/11/2023

Learning Near-Optimal Intrusion Responses Against Dynamic Attackers

We study automated intrusion response and formulate the interaction betw...
research
12/18/2018

Interpretable Optimal Stopping

Optimal stopping is the problem of deciding when to stop a stochastic sy...
research
09/06/2023

Scalable Learning of Intrusion Responses through Recursive Decomposition

We study automated intrusion response for an IT infrastructure and formu...

Please sign up or login with your details

Forgot password? Click here to reset