Machine Learning Cyberattack and Defense Strategies

被引:29
|
作者
Bland, John A. [1 ]
Petty, Mikel D. [1 ]
Whitaker, Tymaine S. [1 ]
Maxwell, Katia P. [2 ]
Cantrell, Walter Alan [3 ]
机构
[1] Univ Alabama Huntsville, 301 Sparkman Dr,OKT N353, Huntsville, AL 35899 USA
[2] Athens State Univ, 300 N Beaty St,Waters Hall S103C, Athens, AL 35611 USA
[3] Lipscomb Univ, Coll Comp & Technol, 1 Univ Pk Dr, Nashville, TN 37204 USA
关键词
Cybersecurity; Modeling; Petri Net; Machine Learning; CAPEC; Reinforcement Learning;
D O I
10.1016/j.cose.2020.101738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is an increasingly important challenge for computer systems. In this work, cyberattacks were modeled using an extension of the well-known Petri net formalism. That formalism, designated Petri nets with players, strategies, and costs, models the states of the cyberattack and events during the attack as markings and transition firings in the net respectively. The formalism models the attacker and defender as competing players who may observe the marking of a subset of the net and based on the observed marking act by changing the stochastic firing rates of a subset of the transitions in order to achieve their competing goals. Rate changes by the players incur a cost. Using the formalism, nets were constructed to model specific cyberattack patterns (cross-site scripting and spear phishing) documented in the Common Attack Pattern Enumeration and Classification database. The models were validated by a panel of cybersecurity experts in a structured face validation process. Given those validated nets, a reinforcement learning algorithm using an-Greedy policy was implemented and set to the task of learning which actions to take, i.e., which transition rates to change for the different observable markings, so as to accomplish the goals of the attacker or defender. Experiments were conducted with a dynamic (learning) attacker against a static (fixed) defender, a static attacker against a dynamic defender, and a dynamic attacker against a dynamic defender. In all cases, the reinforcement learning algorithm was able to improve its performance, in terms of achieving the player's objective and reducing the cost of doing so, over time. These results demonstrate the potential of formally modeling cyberattacks and of applying reinforcement learning to improving cybersecurity. (C) 2020 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Deep Learning Approach for Cyberattack Detection
    Zhou, Yiyun
    Han, Meng
    Liu, Liyuan
    He, Jing
    Wang, Yan
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 262 - 267
  • [32] Conceptualisation of Cyberattack prediction with deep learning
    Ibor, Ayei E.
    Oladeji, Florence A.
    Okunoye, Olusoji B.
    Ekabua, Obeten O.
    CYBERSECURITY, 2020, 3 (01)
  • [33] A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
    Imran, Muhammad
    Siddiqui, Hafeez Ur Rehman
    Raza, Ali
    Raza, Muhammad Amjad
    Rustam, Furqan
    Ashraf, Imran
    COMPUTERS & SECURITY, 2023, 134
  • [34] Conceptualisation of Cyberattack prediction with deep learning
    Ayei E. Ibor
    Florence A. Oladeji
    Olusoji B. Okunoye
    Obeten O. Ekabua
    Cybersecurity, 3
  • [35] Machine Learning Strategies for Protein Crystallization
    Perez-Priede, Monica
    Garcia-Granda, Santiago
    ACTA CRYSTALLOGRAPHICA A-FOUNDATION AND ADVANCES, 2006, 62 : S128 - S128
  • [36] Machine learning to detect intrusion strategies
    Moyle, S
    Heasman, J
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2003, 2773 : 371 - 378
  • [37] Large margin strategies in machine learning
    Cristianini, N
    ISCAS 2000: IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - PROCEEDINGS, VOL II: EMERGING TECHNOLOGIES FOR THE 21ST CENTURY, 2000, : 753 - 756
  • [38] Machine Learning and Therapeutic Strategies in VR
    Lc, Ray
    Fukuoka, Yuka
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON DIGITAL AND INTERACTIVE ARTS (ARTECH 2019), 2019,
  • [39] MACHINE LEARNING ALGORITHM AND STRATEGIES IN WSN
    Dhoke, Akansha
    Nawkhare, Rahul
    Kale, Sandeep
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (01) : 3321 - 3327
  • [40] Evaluating the Role of Machine Learning in Defense Applications and Industry
    Alcantara Suarez, Evaldo Jorge
    Monzon Baeza, Victor
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2023, 5 (04): : 1557 - 1569