INNES: An intelligent network penetration testing model based on deep reinforcement learning

被引:12
作者
Li, Qianyu [1 ]
Hu, Miao [1 ]
Hao, Hao [2 ]
Zhang, Min [1 ]
Li, Yang [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230031, Peoples R China
[2] Qilu Univ Technol, Shandong Comp Sci Ctr, Shandong Acad Sci, Natl Supercomp Ctr Jinan, Jinan 250353, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security assessment; Penetration testing; deep reinforcement learning; Markov decision process;
D O I
10.1007/s10489-023-04946-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Penetration testing (PT) is a crucial way to ensure the security of computer systems. However, it requires a high threshold and can only be implemented by trained experts. Automated tools can reduce the pressure of talent shortages, and reinforcement learning (RL) is a promising approach for achieving automated PT. Due to the unreasonable characterization of the PT process and the low efficiency of RL data, the applicability of the model is limited, and it is difficult to reuse, which hinders its practical application. In this paper, we propose an INNES (INtelligent peNEtration teSting) model based on deep reinforcement learning (DRL). First, the model characterizes the key elements of PT more reasonably based on the Markov decision process (MDP), fully considering the commonality of the PT process in different scenarios to improve its applicability. Second, the DQN_valid algorithm is designed to constrain the agent's action space, to improve the agent's decision-making accuracy, and avoid invalid exploration, according to the feature that enables the effective action space to gradually increase during the PT process. The experimental results show that our model is not only effective for automated PT in the network environment but also has portability, which provides a possible future direction for practical application of intelligent PT based on RL.
引用
收藏
页码:27110 / 27127
页数:18
相关论文
共 40 条
[31]  
Tabassum M, 2021, Ethical hacking and penetrate testing using kali and metasploit framework
[32]  
Tran K, 2021, Deep hierarchical reinforcement agents for automated penetration testing
[33]  
Walter E, 2021, Incorporating deception into cyberbattlesim for autonomous defense
[34]  
Wani A., 2021, CAAI Transactions on Intelligence Technology, V003, P006
[35]  
Witte J., 2023, Artificial intelligence: The future of sustainable agriculture? a research agenda
[36]  
ZC, 2022, Journal of Computational and Cognitive Engineering
[37]  
Zennaro F.M, 2020, Modeling penetration testing with reinforcement learning using capture-the-flag challenges and tabular q-learning
[38]  
Zhang C, 2022, Neurocomputing, P488
[39]   Domain-Independent Intelligent Planning Technology and Its Application to Automated Penetration Testing Oriented Attack Path Discovery [J].
Zhang Yichao ;
Zhou Tianyang ;
Zhu Junhu ;
Wang Qingxian .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (09) :2095-2107
[40]   NIG-AP: a new method for automated penetration testing [J].
Zhou, Tian-yang ;
Zang, Yi-chao ;
Zhu, Jun-hu ;
Wang, Qing-xian .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (09) :1277-1288