Enhancing Cybersecurity: A Proximal Policy Optimization Approach for Security Policy Optimization

被引:0
作者
Yang, Jiuling [1 ]
Shi, Jiayi [1 ]
Kuang, Ping [1 ]
Feng, Zhikun [1 ]
Xiong, Kun [2 ]
Shi, Yuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
[2] China Elect Technol Cyber Secur Co Ltd, Chengdu, Sichuan, Peoples R China
来源
PROCEEDINGS OF 2024 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE, CSAI 2024 | 2024年
关键词
information security; cybersecurity; information security policies; PPO;
D O I
10.1145/3709026.3709112
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the continuous evolution of cyber threats, cybersecurity strategies are crucial for addressing these threats to protect digital assets, data integrity, and system availability. Ensuring safe and efficient policy optimization in the face of cyber threats remains a significant challenge in current research. This paper proposes a security policy optimization model based on Proximal Policy Optimization (PPO). The model effectively constrains the step size of policy updates by incorporating a Kullback-Leibler divergence constraint on the magnitude of parameter changes into the objective function and constructing a new objective function to clip the advantage function, thereby simplifying the problem-solving process. Experimental results show that, compared to traditional methods, our model achieves a throughput increase to 95.875 Mbit/s, reduces the packet capture rate to 22.12% decreases network latency to 42.57 ms, and converges overall in a more favorable direction.
引用
收藏
页码:614 / 620
页数:7
相关论文
共 18 条
[1]  
Bai Z, 2023, Annual Reviews in Control, V45, P98
[2]   DYNAMIC PROGRAMMING [J].
BELLMAN, R .
SCIENCE, 1966, 153 (3731) :34-&
[3]  
Bertsekas D. P., 1997, J. Oper. Res. Soc., V48, P334, DOI DOI 10.1057/PALGRAVE.JORS.2600425
[4]   SAC-AP: Soft Actor Critic based Deep Reinforcement Learning for Alert Prioritization [J].
Chavali, Lalitha ;
Gupta, Tanay ;
Saxena, Paresh .
2022 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2022,
[5]  
Dantzig George Bernard, 1998, Linear programming and extensions
[6]   DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks [J].
Dong, Shi ;
Sarem, Mudar .
IEEE ACCESS, 2020, 8 :5039-5048
[7]  
Hammad AA., 2024, Proc Cogn Models Artif Intell Conf, DOI [10.1145/3660853.3660930, DOI 10.1145/3660853.3660930]
[8]  
Kethireddy RR, 2023, International Journal of Artificial Intelligence Research and Development
[9]  
Mnih V, 2016, Arxiv, DOI [arXiv:1602.01783, DOI 10.48550/ARXIV.1602.01783]
[10]   Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity [J].
Oh, Sang Ho ;
Kim, Jeongyoon ;
Nah, Jae Hoon ;
Park, Jongyoul .
ELECTRONICS, 2024, 13 (03)