Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik. KTH, Skolan för elektroteknik och datavetenskap (EECS), Centra, Centrum för cyberförsvar och informationssäkerhet CDIS.ORCID-id: 0000-0003-1773-8354
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik. KTH, Skolan för elektroteknik och datavetenskap (EECS), Centra, Centrum för cyberförsvar och informationssäkerhet CDIS.ORCID-id: 0000-0001-6039-8493
2024 (engelsk)Inngår i: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 21, nr 1, s. 1158-1177Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve through reinforcement learning and self-play. The game-theoretic modeling enables us to find defender strategies that are effective against a dynamic attacker, i.e., an attacker that adapts its strategy in response to the defender strategy. Further, the optimal stopping formulation allows us to prove that best response strategies have threshold properties. To obtain near-optimal defender strategies, we develop Threshold Fictitious Self-Play (T-FP), a fictitious self-play algorithm that learns Nash equilibria through stochastic approximation. We show that T-FP outperforms a state-of-the-art algorithm for our use case. The experimental part of this investigation includes two systems: a simulation system where defender strategies are incrementally learned and an emulation system where statistics are collected that drive simulation runs and where learned strategies are evaluated. We argue that this approach can produce effective defender strategies for a practical IT infrastructure.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE) , 2024. Vol. 21, nr 1, s. 1158-1177
Emneord [en]
Games, Security, Emulation, Reinforcement learning, Observability, Logic gates, History, Cybersecurity, network security, automated security, intrusion response, optimal stopping, Dynkin games, game theory, Markov decision process, MDP, POMDP
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-345922DOI: 10.1109/TNSM.2023.3293413ISI: 001167106200022Scopus ID: 2-s2.0-85164381105OAI: oai:DiVA.org:kth-345922DiVA, id: diva2:1855634
Merknad

QC 20240502

Tilgjengelig fra: 2024-05-02 Laget: 2024-05-02 Sist oppdatert: 2024-07-04bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Person

Hammar, KimStadler, Rolf

Søk i DiVA

Av forfatter/redaktør
Hammar, KimStadler, Rolf
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Network and Service Management

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 135 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf