A Curriculum Framework for Autonomous Network Defense using Multi-agent Reinforcement Learning

Roberto G. Campbell, M. Eirinaki, Younghee Park
{"title":"A Curriculum Framework for Autonomous Network Defense using Multi-agent Reinforcement Learning","authors":"Roberto G. Campbell, M. Eirinaki, Younghee Park","doi":"10.1109/SVCC56964.2023.10165310","DOIUrl":null,"url":null,"abstract":"Early threat detection is an increasing part of the cybersecurity landscape given the growing scale and scope of cyberattacks in the recent years. Increasing exploitation of software vulnerabilities, especially in the manufacturing sector, demonstrates the ongoing need for autonomous network defense. In this work, we model the problem as a zero-sum Markov game between an attacker and defender reinforcement learning agents. Previous methods test their approach on a single topology or limit the agents to a subset of the network. However, real world networks are rarely fixed and often add or remove hosts based on demand, link failures, outages, or other factors. We consider two types of topologies: static topologies that remain fixed throughout training and a dynamic topology curriculum. The proposed robust training curriculum incorporates network topologies to build more general, capable agents. We also use Proximal Policy optimization (PPO) which offers a good balance of computational complexity and convergence speed. We evaluate various threat scenarios in terms of the exploitability and impact and conclude that the curriculum improves the defender’s win rate over training on a static topology by exposing the agent to more challenging environments over time.","PeriodicalId":243155,"journal":{"name":"2023 Silicon Valley Cybersecurity Conference (SVCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Silicon Valley Cybersecurity Conference (SVCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SVCC56964.2023.10165310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Early threat detection is an increasing part of the cybersecurity landscape given the growing scale and scope of cyberattacks in the recent years. Increasing exploitation of software vulnerabilities, especially in the manufacturing sector, demonstrates the ongoing need for autonomous network defense. In this work, we model the problem as a zero-sum Markov game between an attacker and defender reinforcement learning agents. Previous methods test their approach on a single topology or limit the agents to a subset of the network. However, real world networks are rarely fixed and often add or remove hosts based on demand, link failures, outages, or other factors. We consider two types of topologies: static topologies that remain fixed throughout training and a dynamic topology curriculum. The proposed robust training curriculum incorporates network topologies to build more general, capable agents. We also use Proximal Policy optimization (PPO) which offers a good balance of computational complexity and convergence speed. We evaluate various threat scenarios in terms of the exploitability and impact and conclude that the curriculum improves the defender’s win rate over training on a static topology by exposing the agent to more challenging environments over time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于多智能体强化学习的自主网络防御课程框架
鉴于近年来网络攻击的规模和范围不断扩大,早期威胁检测在网络安全领域中扮演着越来越重要的角色。越来越多的软件漏洞被利用,特别是在制造业,表明了对自主网络防御的持续需求。在这项工作中,我们将问题建模为攻击者和防御者强化学习代理之间的零和马尔可夫博弈。以前的方法在单个拓扑上测试它们的方法,或者将代理限制在网络的一个子集上。然而,现实世界的网络很少是固定的,并且经常根据需求、链路故障、中断或其他因素添加或删除主机。我们考虑两种类型的拓扑:在整个训练过程中保持固定的静态拓扑和动态拓扑课程。提出的健壮训练课程结合网络拓扑来构建更通用、更有能力的代理。我们还使用了近似策略优化(PPO),它提供了计算复杂度和收敛速度的良好平衡。我们根据可利用性和影响评估了各种威胁场景,并得出结论:随着时间的推移,通过将代理暴露在更具挑战性的环境中,课程提高了防御者在静态拓扑上训练的胜率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
BlockNIC: SmartNIC assisted Blockchain HoneyContainer: Container-based Webshell Command Injection Defending and Backtracking Malware Detection through Contextualized Vector Embeddings Autonomous Lending Organization on Ethereum with Credit Scoring OFMCDM/IRF: A Phishing Website Detection Model based on Optimized Fuzzy Multi-Criteria Decision-Making and Improved Random Forest
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1