INNES: An intelligent network penetration testing model based on deep reinforcement learning

被引:8
作者
Li, Qianyu [1 ]
Hu, Miao [1 ]
Hao, Hao [2 ]
Zhang, Min [1 ]
Li, Yang [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230031, Peoples R China
[2] Qilu Univ Technol, Shandong Comp Sci Ctr, Shandong Acad Sci, Natl Supercomp Ctr Jinan, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security assessment; Penetration testing; deep reinforcement learning; Markov decision process;
D O I
10.1007/s10489-023-04946-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Penetration testing (PT) is a crucial way to ensure the security of computer systems. However, it requires a high threshold and can only be implemented by trained experts. Automated tools can reduce the pressure of talent shortages, and reinforcement learning (RL) is a promising approach for achieving automated PT. Due to the unreasonable characterization of the PT process and the low efficiency of RL data, the applicability of the model is limited, and it is difficult to reuse, which hinders its practical application. In this paper, we propose an INNES (INtelligent peNEtration teSting) model based on deep reinforcement learning (DRL). First, the model characterizes the key elements of PT more reasonably based on the Markov decision process (MDP), fully considering the commonality of the PT process in different scenarios to improve its applicability. Second, the DQN_valid algorithm is designed to constrain the agent's action space, to improve the agent's decision-making accuracy, and avoid invalid exploration, according to the feature that enables the effective action space to gradually increase during the PT process. The experimental results show that our model is not only effective for automated PT in the network environment but also has portability, which provides a possible future direction for practical application of intelligent PT based on RL.
引用
收藏
页码:27110 / 27127
页数:18
相关论文
共 40 条
  • [1] Abu-Dabaseh F, 2018, 4 INT C NATURAL LANG
  • [2] Ahmadi H, 2022, Information and software technology, P147
  • [3] [Anonymous], 2017, Automated attack planning using a partially observable model for penetration testing of industrial control systems
  • [4] Calderon P., 2017, Nmap: Network Exploration and Security Auditing Cookbook - Second Edition Network Discovery and Security Scanning at Your Fingertips, Vsecond
  • [5] RETRACTED: Audio-Visual Automatic Speech Recognition Towards Education for Disabilities (Retracted Article)
    Debnath, Saswati
    Roy, Pinki
    Namasudra, Suyel
    Crespo, Ruben Gonzalez
    [J]. JOURNAL OF AUTISM AND DEVELOPMENTAL DISORDERS, 2023, 53 (09) : 3581 - 3594
  • [6] Ghanem MC, 2018, PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), P185, DOI 10.1109/WorldS4.2018.8611595
  • [7] A Novel Technique for Accelerating Live Migration in Cloud Computing
    Gupta, Ambika
    Namasudra, Suyel
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2022, 29 (01)
  • [8] Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing
    Gutub, Adnan
    [J]. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2023, 8 (02) : 440 - 452
  • [9] Hoffmann J, 2015, P I C AUTOMAT PLAN S, P364
  • [10] Hunt MS, 2023, Ocular Telehealth, P213