Network Defense Strategy Selection with Reinforcement Learning and Pareto Optimization

被引:7
作者
Sun, Yang [1 ]
Xiong, Wei [1 ]
Yao, Zhonghua [1 ]
Moniz, Krishna [2 ]
Zahir, Ahmed [2 ]
机构
[1] Equipment Acad, Sci & Technol Complex Elect Syst Simulat Lab, Beijing 101416, Peoples R China
[2] Beijing Univ Posts & Telecommun, Key Lab Trustworthy Distributed Comp & Serv, Beijing 100876, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2017年 / 7卷 / 11期
关键词
Pareto front; Q-learning; multi-objective optimization; network security; FLOW-CONTROL; MODEL;
D O I
10.3390/app7111138
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Improving network security is a difficult problem that requires balancing several goals, such as defense cost and need for network efficiency, in order to achieve proper results. In this paper, we devise method of modeling network attack in a zero-sum multi-objective game and attempt to find the best defense against such an attack. We combined Pareto optimization and Q-learning methods to determine the most harmful attacks and consequently to find the best defense against those attacks. The results should help network administrators in search of a hands-on method of improving network security.
引用
收藏
页数:24
相关论文
共 56 条
[11]  
Coelho LD, 2007, STUD COMPUT INTELL, V50, P3
[12]  
Cole R., 2003, P 35 ANN ACM S THEOR
[13]  
Defaweux A., 2001, P GECCO SAN FRANC CA
[14]  
Eisenstadt E., 2015, P 2015 IEEE C COMP I
[15]   Novel Solution Approach for Multi-Objective Attack-Defense Cyber Games With Unknown Utilities of the Opponent [J].
Eisenstadt, Erella ;
Moshaiov, Amiram .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2017, 1 (01) :16-26
[16]   An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks [J].
Fang, He ;
Xu, Li ;
Li, Jie ;
Choo, Kim-Kwang Raymond .
COMPUTER COMMUNICATIONS, 2017, 105 :124-132
[17]  
Girgin S, 2007, 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P817
[18]  
Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274
[19]  
Gueye A., 2012, DECISION GAME THEORY, P186, DOI DOI 10.1007/978-3-642-34266-0_11
[20]  
Guzman M. A., 2013, P 15 ANN C COMP GEN