Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

被引:26
|
作者
Erdodi, Laszlo [1 ]
Sommervoll, Avald Aslaugson [1 ]
Zennaro, Fabio Massimo [1 ]
机构
[1] Univ Oslo, Dept Informat, Oslo, Norway
关键词
SQL injection; Capture the flag; Vulnerability detection; Autonomous agents; Reinforcement learning; Q-learning; LEVEL;
D O I
10.1016/j.jisa.2021.102903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a formalization of the process of exploitation of SQL injection vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by casting this problem as a security capturethe-flag challenge. We model it as a Markov decision process, and we implement it as a reinforcement learning problem. We then deploy reinforcement learning agents tasked with learning an effective policy to perform SQL injection; we design our training in such a way that the agent learns not just a specific strategy to solve an individual challenge but a more generic policy that may be applied to perform SQL injection attacks against any system instantiated randomly by our problem generator. We analyze the results in terms of the quality of the learned policy and in terms of convergence time as a function of the complexity of the challenge and the learning agent's complexity. Our work fits in the wider research on the development of intelligent agents for autonomous penetration testing and white-hat hacking, and our results aim to contribute to understanding the potential and the limits of reinforcement learning in a security environment.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents
    Sommervoll, Avald Aslaugson
    Erdodi, Laszlo
    Zennaro, Fabio Massimo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 225 - 246
  • [2] Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents
    Åvald Åslaugson Sommervoll
    László Erdődi
    Fabio Massimo Zennaro
    International Journal of Information Security, 2024, 23 : 225 - 246
  • [3] Deep Reinforcement Learning: From Q-Learning to Deep Q-Learning
    Tan, Fuxiao
    Yan, Pengfei
    Guan, Xinping
    NEURAL INFORMATION PROCESSING (ICONIP 2017), PT IV, 2017, 10637 : 475 - 483
  • [4] Reinforcement distribution in a team of cooperative Q-learning agents
    Abbasi, Zahra
    Abbasi, Mohammad Ali
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 154 - +
  • [5] Automated Vulnerability Exploitation Using Deep Reinforcement Learning
    Almajali, Anas
    Al-Abed, Loiy
    Yousef, Khalil M. Ahmad
    Mohd, Bassam J.
    Samamah, Zaid
    Abu Shhadeh, Anas
    APPLIED SCIENCES-BASEL, 2024, 14 (20):
  • [6] Fuzzy Q-Learning for generalization of reinforcement learning
    Berenji, HR
    FUZZ-IEEE '96 - PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 1996, : 2208 - 2214
  • [7] Deep Reinforcement Learning with Double Q-Learning
    van Hasselt, Hado
    Guez, Arthur
    Silver, David
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 2094 - 2100
  • [8] Reinforcement learning guidance law of Q-learning
    Zhang Q.
    Ao B.
    Zhang Q.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2020, 42 (02): : 414 - 419
  • [9] Multi-Agent Reinforcement Learning - An Exploration Using Q-Learning
    Graham, Caoimhin
    Bell, David
    Luo, Zhihui
    RESEARCH AND DEVELOPMENT IN INTELLIGENT SYSTEMS XXVI: INCORPORATING APPLICATIONS AND INNOVATIONS IN INTELLIGENT SYSTEMS XVII, 2010, : 293 - 298
  • [10] Autonomous Driving in Roundabout Maneuvers Using Reinforcement Learning with Q-Learning
    Garcia Cuenca, Laura
    Puertas, Enrique
    Fernandez Andres, Javier
    Aliane, Nourdine
    ELECTRONICS, 2019, 8 (12)