AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks

被引:1
作者
Mi, Yu [1 ]
Mohaisen, David [2 ]
Wang, An [1 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
[2] Univ Cent Florida, Orlando, FL 32816 USA
来源
2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2022年
关键词
D O I
10.1109/CNS56114.2022.9947232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attributed to the programmability and visibility provided by Software Defined Network (SDN) technologies, more flexible and complex functions can be performed on network attacks. However, identifying the attack traffic accurately for attack mitigation is a challenge. Most existing solutions leverage traffic characteristics to achieve this goal. Recent attacks characteristics have become more complex and indistinguishable from legitimate traffic. In this paper, we propose AutoDefense, a novel framework that leverages reinforcement learning techniques to deploy defense policies dynamically and adaptively based on the signals collected from the data plane. While we seek to achieve the same goal with the existing efforts where the network/server resources the attackers control should be limited, we allow more legitimate flows to enter the network, rather than relinquish bandwidth when attacks happen. Through evaluations, we demonstrate that AutoDefense could reduce 39% of the attack traffic and allow 48.6% more legitimate flows in the network. AutoDefense also improves the average flow completion time by 42.7% for the flows with a long tail latency.
引用
收藏
页码:163 / 171
页数:9
相关论文
共 52 条
  • [1] Abusnaina A., 2019, P IEEE DSC
  • [2] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [3] AGRAWAL R, 1992, PROC INT CONF VERY L, P560
  • [4] Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
    Alasmary, Hisham
    Abusnaina, Ahmed
    Jang, Rhongho
    Abuhamad, Mohammed
    Anwar, Afsah
    Nyang, DaeHun
    Mohaisen, David
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 888 - 898
  • [5] [Anonymous], 2021, UFONET DENIAL SERVIC
  • [6] [Anonymous], 2021, IDS 2018 1 DATASETS
  • [7] [Anonymous], 1998, 1998 WORLD CUP WEB S
  • [8] [Anonymous], 2013, USC ISI ANT PROJECT
  • [9] [Anonymous], 2015, P DIMVA
  • [10] [Anonymous], Active Network Security Tool, 2020