Machine Learning Cyberattack and Defense Strategies

被引:29
|
作者
Bland, John A. [1 ]
Petty, Mikel D. [1 ]
Whitaker, Tymaine S. [1 ]
Maxwell, Katia P. [2 ]
Cantrell, Walter Alan [3 ]
机构
[1] Univ Alabama Huntsville, 301 Sparkman Dr,OKT N353, Huntsville, AL 35899 USA
[2] Athens State Univ, 300 N Beaty St,Waters Hall S103C, Athens, AL 35611 USA
[3] Lipscomb Univ, Coll Comp & Technol, 1 Univ Pk Dr, Nashville, TN 37204 USA
关键词
Cybersecurity; Modeling; Petri Net; Machine Learning; CAPEC; Reinforcement Learning;
D O I
10.1016/j.cose.2020.101738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is an increasingly important challenge for computer systems. In this work, cyberattacks were modeled using an extension of the well-known Petri net formalism. That formalism, designated Petri nets with players, strategies, and costs, models the states of the cyberattack and events during the attack as markings and transition firings in the net respectively. The formalism models the attacker and defender as competing players who may observe the marking of a subset of the net and based on the observed marking act by changing the stochastic firing rates of a subset of the transitions in order to achieve their competing goals. Rate changes by the players incur a cost. Using the formalism, nets were constructed to model specific cyberattack patterns (cross-site scripting and spear phishing) documented in the Common Attack Pattern Enumeration and Classification database. The models were validated by a panel of cybersecurity experts in a structured face validation process. Given those validated nets, a reinforcement learning algorithm using an-Greedy policy was implemented and set to the task of learning which actions to take, i.e., which transition rates to change for the different observable markings, so as to accomplish the goals of the attacker or defender. Experiments were conducted with a dynamic (learning) attacker against a static (fixed) defender, a static attacker against a dynamic defender, and a dynamic attacker against a dynamic defender. In all cases, the reinforcement learning algorithm was able to improve its performance, in terms of achieving the player's objective and reducing the cost of doing so, over time. These results demonstrate the potential of formally modeling cyberattacks and of applying reinforcement learning to improving cybersecurity. (C) 2020 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller
    Mozo, Alberto
    Karamchandani, Amit
    de la Cal, Luis
    Gomez-Canaval, Sandra
    Pastor, Antonio
    Gifre, Lluis
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [22] Applied machine learning strategies
    Israel S.A.
    Sallee P.
    Tanner F.
    Goldstein J.
    Zabel S.
    IEEE Potentials, 2020, 39 (03): : 38 - 42
  • [23] Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
    Nankya, Mary
    Chataut, Robin
    Akl, Robert
    SENSORS, 2023, 23 (21)
  • [24] MLHat: Deployable Machine Learning for Security Defense
    Wang, Gang
    Ciptadi, Arridhana
    Ahmadzadeh, Ali
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 4161 - 4162
  • [25] A Survey on Adversarial Machine Learning for Cyberspace Defense
    Yu, Zheng-Fei
    Yan, Qiao
    Zhou, Yun
    Zidonghua Xuebao/Acta Automatica Sinica, 2022, 48 (07): : 1625 - 1649
  • [26] Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
    Ortiz-Ruiz, Emanuel
    Bermejo, Juan Ramon
    Sicilia, Juan Antonio
    Bermejo, Javier
    ELECTRONICS, 2024, 13 (05)
  • [27] An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles' CAN Bus Using Machine Learning
    Avatefipour, Omid
    Al-Sumaiti, Ameena Saad
    El-Sherbeeny, Ahmed M.
    Awwad, Emad Mahrous
    Elmeligy, Mohammed A.
    Mohamed, Mohamed A.
    Malik, Hafiz
    IEEE ACCESS, 2019, 7 : 127580 - 127592
  • [28] Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
    Mahdi, Zaed S.
    Zaki, Rana M.
    Alzubaidi, Laith
    SECURITY AND PRIVACY, 2024,
  • [29] A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models
    Cui, Lei
    Guo, Lei
    Gao, Longxiang
    Cai, Borui
    Qu, Youyang
    Zhou, Yipeng
    Yu, Shui
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 7824 - 7833
  • [30] Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems
    Cui, Mingjian
    Wang, Jianhui
    Chen, Bo
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1805 - 1808