SoK: A Comparison of Autonomous Penetration Testing Agents

被引:0
作者
Simon, Raphael [1 ]
Mees, Wim [1 ]
机构
[1] Royal Mil Acad, Brussels, Belgium
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
Penetration Testing; Deep Reinforcement Learning; Security Automation; Reinforcement Learning;
D O I
10.1145/3664476.3664484
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the still growing field of cyber security, machine learning methods have largely been employed for detection tasks. Only a small portion revolves around offensive capabilities. Through the rise of Deep Reinforcement Learning, agents have also emerged with the goal of actively assessing the security of systems by the means of penetration testing. Thus learning the usage of different tools to emulate humans. In this paper we present an overview, and comparison of different autonomous penetration testing agents found within the literature. Various agents have been proposed, making use of distinct methods, but several factors such as modelling of the environment and scenarios, different algorithms, and the difference in chosen methods themselves, make it difficult to draw conclusions on the current state and performance of those agents. This comparison also lets us identify research challenges that present a major limiting factor, such as handling large action spaces, partial observability, defining the right reward structure, and learning in a real-world scenario.
引用
收藏
页数:10
相关论文
共 41 条
  • [1] Al Wahaibi S, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P6097
  • [2] Brunton S. L., 2022, Datadriven science and engineering: Machine learning, dynamical systems, and control
  • [3] GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning
    Chen, Jinyin
    Hu, Shulong
    Zheng, Haibin
    Xing, Changyou
    Zhang, Guomin
    [J]. COMPUTERS & SECURITY, 2023, 126
  • [4] Deng GL, 2024, Arxiv, DOI arXiv:2308.06782
  • [5] Dulac-Arnold G, 2016, Arxiv, DOI arXiv:1512.07679
  • [6] Challenges of real-world reinforcement learning: definitions, benchmarks and analysis
    Dulac-Arnold, Gabriel
    Levine, Nir
    Mankowitz, Daniel J.
    Li, Jerry
    Paduraru, Cosmin
    Gowal, Sven
    Hester, Todd
    [J]. MACHINE LEARNING, 2021, 110 (09) : 2419 - 2468
  • [7] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
    Erdodi, Laszlo
    Sommervoll, Avald Aslaugson
    Zennaro, Fabio Massimo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [8] Esteban Jonathan, 2022, Simulating Network Lateral Movements through the CyberBattleSim Web Platform
  • [9] HAXSS: Hierarchical Reinforcement Learning for XSS Payload Generation
    Foley, Myles
    Maffeis, Sergio
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 147 - 158
  • [10] Hausknecht M., 2015, PREPRINT