Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networ...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huang, Lanxiao, Cody, Tyler, Redino, Christopher, Rahman, Abdul, Kakkar, Akshay, Kushwaha, Deepak, Wang, Cheng, Clark, Ryan, Radke, Daniel, Beling, Peter, Bowen, Edward
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Huang, Lanxiao
Cody, Tyler
Redino, Christopher
Rahman, Abdul
Kakkar, Akshay
Kushwaha, Deepak
Wang, Cheng
Clark, Ryan
Radke, Daniel
Beling, Peter
Bowen, Edward
description Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.
doi_str_mv 10.48550/arxiv.2211.03027
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2211_03027</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2211_03027</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-2d73350f761a7a24cbfe3b1ef757e5bb5ae2561ff307958f20cefc33aa12a2663</originalsourceid><addsrcrecordid>eNotz71OwzAUhmEvDKhwAUycC2iCf-q4jFUoBSkSUskenbjHrUXqRI4btXcPFKZvej_pYexB8Hyx1Jo_YTz7KZdSiJwrLs0ts-vz0I8-7OHzFCfyXYfBErxQIpt8H2DbnxKNMHmELfng-mjpSCFBRRjDTziHVUpov2ATcTiMc8Cwg_LSUoSaYkQf7tiNw26k-_-dsfp1XZdvWfWxeS9XVYaFMZncGaU0d6YQaFAubOtItYKc0YZ022okqQvhnOLmWS-d5JacVQpRSJRFoWbs8e_2qmyG6I8YL82vtrlq1TcabFCy</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain</title><source>arXiv.org</source><creator>Huang, Lanxiao ; Cody, Tyler ; Redino, Christopher ; Rahman, Abdul ; Kakkar, Akshay ; Kushwaha, Deepak ; Wang, Cheng ; Clark, Ryan ; Radke, Daniel ; Beling, Peter ; Bowen, Edward</creator><creatorcontrib>Huang, Lanxiao ; Cody, Tyler ; Redino, Christopher ; Rahman, Abdul ; Kakkar, Akshay ; Kushwaha, Deepak ; Wang, Cheng ; Clark, Ryan ; Radke, Daniel ; Beling, Peter ; Bowen, Edward</creatorcontrib><description>Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.</description><identifier>DOI: 10.48550/arxiv.2211.03027</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning ; Computer Science - Networking and Internet Architecture</subject><creationdate>2022-11</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2211.03027$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2211.03027$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Huang, Lanxiao</creatorcontrib><creatorcontrib>Cody, Tyler</creatorcontrib><creatorcontrib>Redino, Christopher</creatorcontrib><creatorcontrib>Rahman, Abdul</creatorcontrib><creatorcontrib>Kakkar, Akshay</creatorcontrib><creatorcontrib>Kushwaha, Deepak</creatorcontrib><creatorcontrib>Wang, Cheng</creatorcontrib><creatorcontrib>Clark, Ryan</creatorcontrib><creatorcontrib>Radke, Daniel</creatorcontrib><creatorcontrib>Beling, Peter</creatorcontrib><creatorcontrib>Bowen, Edward</creatorcontrib><title>Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain</title><description>Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><subject>Computer Science - Networking and Internet Architecture</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAUhmEvDKhwAUycC2iCf-q4jFUoBSkSUskenbjHrUXqRI4btXcPFKZvej_pYexB8Hyx1Jo_YTz7KZdSiJwrLs0ts-vz0I8-7OHzFCfyXYfBErxQIpt8H2DbnxKNMHmELfng-mjpSCFBRRjDTziHVUpov2ATcTiMc8Cwg_LSUoSaYkQf7tiNw26k-_-dsfp1XZdvWfWxeS9XVYaFMZncGaU0d6YQaFAubOtItYKc0YZ022okqQvhnOLmWS-d5JacVQpRSJRFoWbs8e_2qmyG6I8YL82vtrlq1TcabFCy</recordid><startdate>20221106</startdate><enddate>20221106</enddate><creator>Huang, Lanxiao</creator><creator>Cody, Tyler</creator><creator>Redino, Christopher</creator><creator>Rahman, Abdul</creator><creator>Kakkar, Akshay</creator><creator>Kushwaha, Deepak</creator><creator>Wang, Cheng</creator><creator>Clark, Ryan</creator><creator>Radke, Daniel</creator><creator>Beling, Peter</creator><creator>Bowen, Edward</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20221106</creationdate><title>Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain</title><author>Huang, Lanxiao ; Cody, Tyler ; Redino, Christopher ; Rahman, Abdul ; Kakkar, Akshay ; Kushwaha, Deepak ; Wang, Cheng ; Clark, Ryan ; Radke, Daniel ; Beling, Peter ; Bowen, Edward</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-2d73350f761a7a24cbfe3b1ef757e5bb5ae2561ff307958f20cefc33aa12a2663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><topic>Computer Science - Networking and Internet Architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Huang, Lanxiao</creatorcontrib><creatorcontrib>Cody, Tyler</creatorcontrib><creatorcontrib>Redino, Christopher</creatorcontrib><creatorcontrib>Rahman, Abdul</creatorcontrib><creatorcontrib>Kakkar, Akshay</creatorcontrib><creatorcontrib>Kushwaha, Deepak</creatorcontrib><creatorcontrib>Wang, Cheng</creatorcontrib><creatorcontrib>Clark, Ryan</creatorcontrib><creatorcontrib>Radke, Daniel</creatorcontrib><creatorcontrib>Beling, Peter</creatorcontrib><creatorcontrib>Bowen, Edward</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huang, Lanxiao</au><au>Cody, Tyler</au><au>Redino, Christopher</au><au>Rahman, Abdul</au><au>Kakkar, Akshay</au><au>Kushwaha, Deepak</au><au>Wang, Cheng</au><au>Clark, Ryan</au><au>Radke, Daniel</au><au>Beling, Peter</au><au>Bowen, Edward</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain</atitle><date>2022-11-06</date><risdate>2022</risdate><abstract>Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale factor.</abstract><doi>10.48550/arxiv.2211.03027</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2211.03027
ispartof
issn
language eng
recordid cdi_arxiv_primary_2211_03027
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Learning
Computer Science - Networking and Internet Architecture
title Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T01%3A42%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exposing%20Surveillance%20Detection%20Routes%20via%20Reinforcement%20Learning,%20Attack%20Graphs,%20and%20Cyber%20Terrain&rft.au=Huang,%20Lanxiao&rft.date=2022-11-06&rft_id=info:doi/10.48550/arxiv.2211.03027&rft_dat=%3Carxiv_GOX%3E2211_03027%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true