Spatio-Temporal Attack Course-of-Action (COA) Search Learning for Scalable and Time-Varying Networks

09/02/2022
by   Haemin Lee, et al.
0

One of the key topics in network security research is the autonomous COA (Couse-of-Action) attack search method. Traditional COA attack search methods that passively search for attacks can be difficult, especially as the network gets bigger. To address these issues, new autonomous COA techniques are being developed, and among them, an intelligent spatial algorithm is designed in this paper for efficient operations in scalable networks. On top of the spatial search, a Monte-Carlo (MC)- based temporal approach is additionally considered for taking care of time-varying network behaviors. Therefore, we propose a spatio-temporal attack COA search algorithm for scalable and time-varying networks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/27/2022

Tutorial on Course-of-Action (COA) Attack Search Methods in Computer Networks

In the literature of modern network security research, deriving effectiv...
research
11/24/2016

A Spatio-Temporal Representation for the Orienteering Problem with Time-Varying Profits

We consider an orienteering problem (OP) where an agent needs to visit a...
research
05/12/2018

HOC-Tree: A Novel Index for efficient Spatio-temporal Range Search

With the rapid development of mobile computing and Web services, a huge ...
research
11/22/2022

Don't Watch Me: A Spatio-Temporal Trojan Attack on Deep-Reinforcement-Learning-Augment Autonomous Driving

Deep reinforcement learning (DRL) is one of the most popular algorithms ...
research
06/07/2022

Decentralized Online Regularized Learning Over Random Time-Varying Graphs

We study the decentralized online regularized linear regression algorith...
research
10/09/2018

Multi-resolution filters for massive spatio-temporal data

Spatio-temporal data sets are rapidly growing in size. For example, envi...
research
08/26/2020

Defending Water Treatment Networks: Exploiting Spatio-temporal Effects for Cyber Attack Detection

While Water Treatment Networks (WTNs) are critical infrastructures for l...

Please sign up or login with your details

Forgot password? Click here to reset