A Learning-Based Approach to Reactive Security

被引:0
|
作者
Barth, Adam [1 ]
Rubinstein, Benjamin I. P. [1 ]
Sundararajan, Mukund [3 ]
Mitchell, John C. [4 ]
Song, Dawn [1 ]
Bartlett, Peter L. [1 ,2 ]
机构
[1] Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA
[2] Univ Calif Berkeley, Dept Stat, Berkeley, CA 94720 USA
[3] Google Inc, Mt View, Mountain View, CA 94043 USA
[4] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY | 2010年 / 6052卷
关键词
VULNERABILITY; INVESTMENT; EXPERT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.
引用
收藏
页码:192 / +
页数:3
相关论文
共 50 条
  • [1] A Learning-Based Approach to Reactive Security
    Barth, Adam
    Rubinstein, Benjamin I. P.
    Sundararajan, Mukund
    Mitchell, John C.
    Song, Dawn
    Bartlett, Peter L.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 482 - 493
  • [2] PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach
    Lin, Zhihao
    Ma, Wei
    Zhou, Mingyi
    Zhao, Yanjie
    Wang, Haoyu
    Liu, Yang
    Wang, Jun
    Li, Li
    arXiv,
  • [3] Incremental Learning-Based Testing for Reactive Systems
    Meinke, Karl
    Sindhu, Muddassar A.
    TESTS AND PROOFS, TAP 2011, 2011, 6706 : 134 - 151
  • [4] A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
    Zahednejad, Behnam
    Ke, Lishan
    Li, Jing
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [5] A dual learning-based recommendation approach
    Wan, Shanshan
    Liu, Ying
    Qiu, Dongwei
    Chambua, James
    Niu, Zhendong
    KNOWLEDGE-BASED SYSTEMS, 2022, 254
  • [6] A learning-based approach to coastal management
    Olsen, SB
    Tobey, J
    Hale, LZ
    AMBIO, 1998, 27 (08) : 611 - 619
  • [7] A Learning-Based Approach for IP Geolocation
    Eriksson, Brian
    Barford, Paul
    Sommers, Joel
    Nowak, Robert
    PASSIVE AND ACTIVE MEASUREMENT, PROCEEDINGS, 2010, 6032 : 171 - +
  • [8] Enforcing Intelligent Learning-Based Security in Internet of Everything
    Pant, Shrid
    Sharma, Mehul
    Sharma, Deepak Kumar
    Gupta, Deepak
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3071 - 3078
  • [9] LeaPS: Learning-Based Proactive Security Auditing for Clouds
    Majumdar, Suryadipta
    Jarraya, Yosr
    Oqaily, Momen
    Alimohammadifar, Amir
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 265 - 285
  • [10] A Deep Learning-Based Password Security Evaluation Model
    Hong, Ki Hyeon
    Lee, Byung Mun
    APPLIED SCIENCES-BASEL, 2022, 12 (05):