Learning Near-Optimal Intrusion Responses Against Dynamic Attackers

01/11/2023
by   Kim Hammar, et al.
0

We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve through reinforcement learning and self-play. The game-theoretic modeling enables us to find defender strategies that are effective against a dynamic attacker, i.e. an attacker that adapts its strategy in response to the defender strategy. Further, the optimal stopping formulation allows us to prove that optimal strategies have threshold properties. To obtain near-optimal defender strategies, we develop Threshold Fictitious Self-Play (T-FP), a fictitious self-play algorithm that learns Nash equilibria through stochastic approximation. We show that T-FP outperforms a state-of-the-art algorithm for our use case. The experimental part of this investigation includes two systems: a simulation system where defender strategies are incrementally learned and an emulation system where statistics are collected that drive simulation runs and where learned strategies are evaluated. We argue that this approach can produce effective defender strategies for a practical IT infrastructure.

READ FULL TEXT

page 1

page 10

research
05/29/2022

Learning Security Strategies through Game Play and Optimal Stopping

We study automated intrusion prevention using reinforcement learning. Fo...
research
09/06/2023

Scalable Learning of Intrusion Responses through Recursive Decomposition

We study automated intrusion response for an IT infrastructure and formu...
research
09/17/2020

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

We present a method to automatically find security strategies for the us...
research
10/30/2021

Intrusion Prevention through Optimal Stopping

We study automated intrusion prevention using reinforcement learning. Fo...
research
06/14/2021

Learning Intrusion Prevention Policies through Optimal Stopping

We study automated intrusion prevention using reinforcement learning. In...
research
08/22/2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Honeypots play a crucial role in implementing various cyber deception te...
research
06/29/2023

Towards Optimal Randomized Strategies in Adversarial Example Game

The vulnerability of deep neural network models to adversarial example a...

Please sign up or login with your details

Forgot password? Click here to reset