Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning

07/09/2020
by   Lei Zhang, et al.
1

In this work, we present a learning-based approach to analysis cyberspace configuration. Unlike prior methods, our approach has the ability to learn from past experience and improve over time. In particular, as we train over a greater number of agents as attackers, our method becomes better at rapidly finding attack paths for previously hidden paths, especially in multiple domain cyberspace. To achieve these results, we pose finding attack paths as a Reinforcement Learning (RL) problem and train an agent to find multiple domain attack paths. To enable our RL policy to find more hidden attack paths, we ground representation introduction an multiple domain action select module in RL. By designing a simulated cyberspace experimental environment to verify our method. Our objective is to find more hidden attack paths, to analysis the weakness of cyberspace configuration. The experimental results show that our method can find more hidden multiple domain attack paths than existing baselines methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 6

page 7

page 8

page 9

research
04/15/2021

Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning

In this work, we present a learning-based approach to analysis cyberspac...
research
04/22/2020

Chip Placement with Deep Reinforcement Learning

In this work, we present a learning-based approach to chip placement, on...
research
01/28/2022

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Reinforcement learning (RL), in conjunction with attack graphs and cyber...
research
11/06/2022

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Reinforcement learning (RL) operating on attack graphs leveraging cyber ...
research
05/14/2022

PrefixRL: Optimization of Parallel Prefix Circuits using Deep Reinforcement Learning

In this work, we present a reinforcement learning (RL) based approach to...
research
05/27/2022

Tutorial on Course-of-Action (COA) Attack Search Methods in Computer Networks

In the literature of modern network security research, deriving effectiv...
research
06/20/2023

Analysis of the Benefits and Efficacy of the Addition of Variants and Reality Paths to the Blackboard Architecture

While the Blackboard Architecture has been in use since the 1980s, it ha...

Please sign up or login with your details

Forgot password? Click here to reset