...
首页> 外文期刊>Computers & Security >Machine Learning Cyberattack and Defense Strategies
【24h】

Machine Learning Cyberattack and Defense Strategies

机译:机器学习网络攻击与防御策略

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Cybersecurity is an increasingly important challenge for computer systems. In this work, cyberattacks were modeled using an extension of the well-known Petri net formalism. That formalism, designated Petri nets with players, strategies, and costs, models the states of the cyberattack and events during the attack as markings and transition firings in the net respectively. The formalism models the attacker and defender as competing players who may observe the marking of a subset of the net and based on the observed marking act by changing the stochastic firing rates of a subset of the transitions in order to achieve their competing goals. Rate changes by the players incur a cost. Using the formalism, nets were constructed to model specific cyberattack patterns (cross-site scripting and spear phishing) documented in the Common Attack Pattern Enumeration and Classification database. The models were validated by a panel of cybersecurity experts in a structured face validation process. Given those validated nets, a reinforcement learning algorithm using an -Greedy policy was implemented and set to the task of learning which actions to take, i.e., which transition rates to change for the different observable markings, so as to accomplish the goals of the attacker or defender. Experiments were conducted with a dynamic (learning) attacker against a static (fixed) defender, a static attacker against a dynamic defender, and a dynamic attacker against a dynamic defender. In all cases, the reinforcement learning algorithm was able to improve its performance, in terms of achieving the player's objective and reducing the cost of doing so, over time. These results demonstrate the potential of formally modeling cyberattacks and of applying reinforcement learning to improving cybersecurity.
机译:网络安全对于计算机系统而言是日益重要的挑战。在这项工作中,网络攻击是使用著名的Petri网络形式主义的扩展建模的。形式化,即用球员,策略和成本指定Petri网,将攻击过程中网络攻击的状态和事件建模为网络中的标记和过渡触发。形式主义将攻击者和防御者建模为竞争参与者,他们可以观察网络子集的标记,并根据观察到的标记行为,通过更改过渡子集的随机触发率来实现他们的竞争目标。玩家更改价格会产生费用。使用形式主义,构建了网络,以对“通用攻击模式枚举和分类”数据库中记录的特定网络攻击模式(跨站点脚本和鱼叉式网络钓鱼)进行建模。网络安全专家小组在结构化的面部验证过程中对模型进行了验证。给定那些经过验证的网络,便实施了使用-Greedy策略的强化学习算法,并将其设置为学习以下任务的任务:采取何种操作,即针对不同的可观察标记改变哪种过渡速率,从而实现攻击者的目标或后卫。实验是针对静态(固定)防御者的动态(学习)攻击者,针对动态防御者的静态攻击者和针对动态防御者的动态攻击者进行的。在所有情况下,随着时间的推移,强化学习算法都可以提高其性能,从而达到玩家的目标并降低这样做的成本。这些结果证明了正式建模网络攻击和应用强化学习来改善网络安全的潜力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号