Inroads into Autonomous Network Defence using Explained Reinforcement
Learning
- URL: http://arxiv.org/abs/2306.09318v1
- Date: Thu, 15 Jun 2023 17:53:14 GMT
- Title: Inroads into Autonomous Network Defence using Explained Reinforcement
Learning
- Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis
- Abstract summary: This paper introduces an end-to-end methodology for studying attack strategies, designing defence agents and explaining their operation.
We use state diagrams, deep reinforcement learning agents trained on different parts of the task and organised in a shallow hierarchy.
Our evaluation shows that the resulting design achieves a substantial performance improvement compared to prior work.
- Score: 0.5949779668853555
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Computer network defence is a complicated task that has necessitated a high
degree of human involvement. However, with recent advancements in machine
learning, fully autonomous network defence is becoming increasingly plausible.
This paper introduces an end-to-end methodology for studying attack strategies,
designing defence agents and explaining their operation. First, using state
diagrams, we visualise adversarial behaviour to gain insight about potential
points of intervention and inform the design of our defensive models. We opt to
use a set of deep reinforcement learning agents trained on different parts of
the task and organised in a shallow hierarchy. Our evaluation shows that the
resulting design achieves a substantial performance improvement compared to
prior work. Finally, to better investigate the decision-making process of our
agents, we complete our analysis with a feature ablation and importance study.
Related papers
- Hierarchical Multi-agent Reinforcement Learning for Cyber Network Defense [7.967738380932909]
We propose a hierarchical Proximal Policy Optimization (PPO) architecture that decomposes the cyber defense task into specific sub-tasks like network investigation and host recovery.
Our approach involves training sub-policies for each sub-task using PPO enhanced with domain expertise.
These sub-policies are then leveraged by a master defense policy that coordinates their selection to solve complex network defense tasks.
arXiv Detail & Related papers (2024-10-22T18:35:05Z) - Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks [0.0]
Adversarial attacks pose significant threats to the robustness of deep learning models in image classification.
This paper explores and refines defense mechanisms against these attacks to enhance the resilience of neural networks.
arXiv Detail & Related papers (2024-08-20T02:00:02Z) - Learning Cyber Defence Tactics from Scratch with Multi-Agent
Reinforcement Learning [4.796742432333795]
Team of intelligent agents in computer network defence roles may reveal promising avenues to safeguard cyber and kinetic assets.
Agents are evaluated on their ability to jointly mitigate attacker activity in host-based defence scenarios.
arXiv Detail & Related papers (2023-08-25T14:07:50Z) - Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
Contemporary Survey [114.17568992164303]
Adrial attacks and defenses in machine learning and deep neural network have been gaining significant attention.
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques.
New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks.
arXiv Detail & Related papers (2023-03-11T04:19:31Z) - Graph Neural Networks for Decentralized Multi-Agent Perimeter Defense [111.9039128130633]
We develop an imitation learning framework that learns a mapping from defenders' local perceptions and their communication graph to their actions.
We run perimeter defense games in scenarios with different team sizes and configurations to demonstrate the performance of the learned network.
arXiv Detail & Related papers (2023-01-23T19:35:59Z) - Learning Decentralized Strategies for a Perimeter Defense Game with
Graph Neural Networks [111.9039128130633]
We design a graph neural network-based learning framework to learn a mapping from defenders' local perceptions and the communication graph to defenders' actions.
We demonstrate that our proposed networks stay closer to the expert policy and are superior to other baseline algorithms by capturing more intruders.
arXiv Detail & Related papers (2022-09-24T22:48:51Z) - Rethinking Learning Dynamics in RL using Adversarial Networks [79.56118674435844]
We present a learning mechanism for reinforcement learning of closely related skills parameterized via a skill embedding space.
The main contribution of our work is to formulate an adversarial training regime for reinforcement learning with the help of entropy-regularized policy gradient formulation.
arXiv Detail & Related papers (2022-01-27T19:51:09Z) - Autonomous Attack Mitigation for Industrial Control Systems [25.894883701063055]
Defending computer networks from cyber attack requires timely responses to alerts and threat intelligence.
We present a deep reinforcement learning approach to autonomous response and recovery in large industrial control networks.
arXiv Detail & Related papers (2021-11-03T18:08:06Z) - Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial
Robustness [53.094682754683255]
We propose a Model-Agnostic Meta-Attack (MAMA) approach to discover stronger attack algorithms automatically.
Our method learns the in adversarial attacks parameterized by a recurrent neural network.
We develop a model-agnostic training algorithm to improve the ability of the learned when attacking unseen defenses.
arXiv Detail & Related papers (2021-10-13T13:54:24Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - Network Defense is Not a Game [0.0]
Research seeks to apply Artificial Intelligence to scale and extend the capabilities of human operators to defend networks.
Our position is that network defense is better characterized as a collection of games with uncertain and possibly drifting rules.
We propose to define network defense tasks as distributions of network environments.
arXiv Detail & Related papers (2021-04-20T21:52:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.