Speeding up Planning of Cyber Attacks Using AI Techniques: State of the art

被引:0
|
作者
Grant, Tim [1 ]
机构
[1] R BAR, Benschop, Netherlands
关键词
offensive operations; automated planning; vulnerability scanning; penetration testing; red teaming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cyber warfare, launching a counter-attack should be done as fast as possible after an incoming attack, ideally cutting it short. This places severe demands on detecting the incoming attack, assessing damage, identifying the attacker, obtaining approval for a counter-attack, planning it, and preparing the resources needed. These processes take weeks or months at present, when hours or minutes are desired. Previous papers have assessed the feasibility of speeding up the digital forensics and parliamentary approval processes. This paper focuses on attack planning, assessing the state of the art in applying Artificial Intelligence (AI) techniques to automate this process. AI researchers began studying the automated generation of plans in the late 1960s. The first successful system was the Stanford Research Institute Planning System (STRIPS), developed in 1971. Since then, research into AI planning and scheduling has flourished. Milestones include the widespread use of the Planning Domain Description Language and the publication of a textbook in 2004. The technology has matured, with commercial applications in logistics, airline operations, and space exploration. The first known application to cyber operations came in 2005, when Boddy and co-workers applied AI planning techniques to generate cyber-attack plans to assess the vulnerability of information systems. The purpose of this paper is to assess the state of the art in applying AI techniques to speed up cyber-attack planning. There are five sections. After the introduction, the second section outlines the relevant literature on offensive cyber and classical AI planning. The third section focuses on adapting the military operation planning process to cyber operations. The fourth section assesses what has been achieved in applying AI techniques and what gaps remain. The fifth section draws conclusions and recommends further research.
引用
收藏
页码:235 / 244
页数:10
相关论文
共 50 条
  • [1] Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
    Aldauiji, Fatimah
    Batarfi, Omar
    Bayousef, Manal
    IEEE ACCESS, 2022, 10 : 61695 - 61706
  • [2] A state of the art survey - Impact of cyber attacks on SME's
    Saleem, Jibran
    Adebisi, Bamidele
    Ande, Ruth
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [3] SIMULATING NETWORK CYBER ATTACKS USING SPLITTING TECHNIQUES
    Masi, Denise M. B.
    Fischer, Martin J.
    Shortle, John F.
    Chen, Chun-Hung
    PROCEEDINGS OF THE 2011 WINTER SIMULATION CONFERENCE (WSC), 2011, : 3212 - 3223
  • [4] A Review of The State of The Art of Beamforming Techniques and AI
    Mosteghanemi, Reda
    Benyarou, Mourad
    Bendimerad, Fethi Tank
    PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024, 2024,
  • [5] Cyber Attacks, Countermeasures, and Protection Schemes- A State of the Art Survey
    Shabut, Antesar M.
    Lwin, K. T.
    Hossain, M. A.
    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA), 2016, : 37 - 44
  • [6] State of the art progress in hydraulic fracture modeling using AI/ML techniques
    Sprunger, Chad
    Muther, Temoor
    Syed, Fahad I.
    Dahaghi, Amirmasoud K.
    Neghabhan, Shahin
    MODELING EARTH SYSTEMS AND ENVIRONMENT, 2022, 8 (01) : 1 - 13
  • [7] State of the art progress in hydraulic fracture modeling using AI/ML techniques
    Chad Sprunger
    Temoor Muther
    Fahad I. Syed
    Amirmasoud K. Dahaghi
    Shahin Neghabhan
    Modeling Earth Systems and Environment, 2022, 8 : 1 - 13
  • [8] Service Adaptation Using AI Planning Techniques
    Mederly, Pavol
    Lekavy, Marian
    Navrat, Pavol
    PROCEEDINGS OF THE 2009 FIFTH INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, NWESP 2009, 2009, : 56 - 59
  • [9] Improving accuracy and efficiency in seagrass detection using state-of-the-art AI techniques
    Noman, Md Kislu
    Islam, Syed Mohammed Shamsul
    Abu-Khalaf, Jumana
    Jalali, Seyed Mohammad Jafar
    Lavery, Paul
    ECOLOGICAL INFORMATICS, 2023, 76
  • [10] Defense Scheme to Protect IoT from Cyber Attacks using AI Principles
    Ahamed, T.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2018, 13 (06) : 915 - 926