Machine Learning Cyberattack and Defense Strategies

被引:29
|
作者
Bland, John A. [1 ]
Petty, Mikel D. [1 ]
Whitaker, Tymaine S. [1 ]
Maxwell, Katia P. [2 ]
Cantrell, Walter Alan [3 ]
机构
[1] Univ Alabama Huntsville, 301 Sparkman Dr,OKT N353, Huntsville, AL 35899 USA
[2] Athens State Univ, 300 N Beaty St,Waters Hall S103C, Athens, AL 35611 USA
[3] Lipscomb Univ, Coll Comp & Technol, 1 Univ Pk Dr, Nashville, TN 37204 USA
关键词
Cybersecurity; Modeling; Petri Net; Machine Learning; CAPEC; Reinforcement Learning;
D O I
10.1016/j.cose.2020.101738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is an increasingly important challenge for computer systems. In this work, cyberattacks were modeled using an extension of the well-known Petri net formalism. That formalism, designated Petri nets with players, strategies, and costs, models the states of the cyberattack and events during the attack as markings and transition firings in the net respectively. The formalism models the attacker and defender as competing players who may observe the marking of a subset of the net and based on the observed marking act by changing the stochastic firing rates of a subset of the transitions in order to achieve their competing goals. Rate changes by the players incur a cost. Using the formalism, nets were constructed to model specific cyberattack patterns (cross-site scripting and spear phishing) documented in the Common Attack Pattern Enumeration and Classification database. The models were validated by a panel of cybersecurity experts in a structured face validation process. Given those validated nets, a reinforcement learning algorithm using an-Greedy policy was implemented and set to the task of learning which actions to take, i.e., which transition rates to change for the different observable markings, so as to accomplish the goals of the attacker or defender. Experiments were conducted with a dynamic (learning) attacker against a static (fixed) defender, a static attacker against a dynamic defender, and a dynamic attacker against a dynamic defender. In all cases, the reinforcement learning algorithm was able to improve its performance, in terms of achieving the player's objective and reducing the cost of doing so, over time. These results demonstrate the potential of formally modeling cyberattacks and of applying reinforcement learning to improving cybersecurity. (C) 2020 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Defense strategies for Adversarial Machine Learning: A survey
    Bountakas, Panagiotis
    Zarras, Apostolis
    Lekidis, Alexios
    Xenakis, Christos
    COMPUTER SCIENCE REVIEW, 2023, 49
  • [2] Learning based Cyberattack Design and Defense for Supervisory Control Systems
    Thapliyal, Omanshu
    Hwang, Inseok
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 144 - 149
  • [3] Trustworthy Machine Learning Approaches for Cyberattack Detection: A Review
    Guembe, Blessing
    Azeta, Ambrose
    Misra, Sanjay
    Ahuja, Ravin
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13381 LNCS : 265 - 278
  • [4] Trustworthy Machine Learning Approaches for Cyberattack Detection: A Review
    Guembe, Blessing
    Azeta, Ambrose
    Misra, Sanjay
    Ahuja, Ravin
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART V, 2022, 13381 : 265 - 278
  • [5] Machine learning to combat cyberattack: a survey of datasets and challenges
    Prasad, Arvind
    Chandra, Shalini
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2023, 20 (04): : 577 - 588
  • [6] Cyberattack Correlation and Mitigation for Distribution Systems via Machine Learning
    Appiah-Kubi, Jennifer
    Liu, Chen-Ching
    IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY, 2023, 10 : 128 - 140
  • [7] Spoofed Email Based Cyberattack Detection Using Machine Learning
    Shukla, Sanjeev
    Misra, Manoj
    Varshney, Gaurav
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2025, 65 (02) : 159 - 171
  • [8] Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
    Alshehri, Abdullah
    Khan, Nayeem
    Alowayr, Ali
    Alghamdi, Mohammed Yahya
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1679 - 1689
  • [9] Using Machine Learning to Examine Cyberattack Motivations on Web Defacement Data
    Banerjee, Sudipta
    Swearingen, Thomas
    Shillair, Ruth
    Bauer, Johannes M.
    Holt, Thomas
    Ross, Arun
    SOCIAL SCIENCE COMPUTER REVIEW, 2022, 40 (04) : 914 - 932
  • [10] Cyberattack defense mechanism using deep learning techniques in software-defined networks
    Rao, Dimmiti Srinivasa
    Emerson, Ajith Jubilson
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1279 - 1291