面向全战役仿真的强化学习连续网络测试

Tyler Cody, P. Beling, Laura Freeman
{"title":"面向全战役仿真的强化学习连续网络测试","authors":"Tyler Cody, P. Beling, Laura Freeman","doi":"10.1109/AUTOTESTCON47462.2022.9984769","DOIUrl":null,"url":null,"abstract":"Modern automated penetration testing uses rule-based procedures and model-checking concepts to search through all possible attacks on network models and identify those that violate some correctness or security property by generating an attack graph. By generating all possible attacks, modern, top-down approaches inherently do not isolate the few attacks that matter the most. This weakness is exacerbated in future network settings like 5G and Internet of Things (IoT) settings where networks are expected to have thousands of hosts (or more) and evolve over time. This has created a perception that the attack graph concept itself is inadequate, in turn hindering the automation of cyber testing. Recent research re-positions automated attack graph generation as a best practice in cyber defense by applying deep reinforcement learning (RL). While recent research into penetration testing with RL has seen a rapid growth in interest, a clear concept of operational use has not been defined. We define and provide formalism for the concept of whole campaign emulation (WCE). We present WCE as both a challenge problem and a framework for automating cyber T&E with RL. This manuscript captures an RL-oriented perspective on the past, present, and future of attack graph generation, and serves as a primer from researchers and practitioners alike. With WCE, organizations from small businesses to nation-states can feasibly institute continuous cyber T&E with low test costs and low disruption to operations.","PeriodicalId":298798,"journal":{"name":"2022 IEEE AUTOTESTCON","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Towards Continuous Cyber Testing with Reinforcement Learning for Whole Campaign Emulation\",\"authors\":\"Tyler Cody, P. Beling, Laura Freeman\",\"doi\":\"10.1109/AUTOTESTCON47462.2022.9984769\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern automated penetration testing uses rule-based procedures and model-checking concepts to search through all possible attacks on network models and identify those that violate some correctness or security property by generating an attack graph. By generating all possible attacks, modern, top-down approaches inherently do not isolate the few attacks that matter the most. This weakness is exacerbated in future network settings like 5G and Internet of Things (IoT) settings where networks are expected to have thousands of hosts (or more) and evolve over time. This has created a perception that the attack graph concept itself is inadequate, in turn hindering the automation of cyber testing. Recent research re-positions automated attack graph generation as a best practice in cyber defense by applying deep reinforcement learning (RL). While recent research into penetration testing with RL has seen a rapid growth in interest, a clear concept of operational use has not been defined. We define and provide formalism for the concept of whole campaign emulation (WCE). We present WCE as both a challenge problem and a framework for automating cyber T&E with RL. This manuscript captures an RL-oriented perspective on the past, present, and future of attack graph generation, and serves as a primer from researchers and practitioners alike. With WCE, organizations from small businesses to nation-states can feasibly institute continuous cyber T&E with low test costs and low disruption to operations.\",\"PeriodicalId\":298798,\"journal\":{\"name\":\"2022 IEEE AUTOTESTCON\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE AUTOTESTCON\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AUTOTESTCON47462.2022.9984769\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE AUTOTESTCON","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AUTOTESTCON47462.2022.9984769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

现代自动化渗透测试使用基于规则的过程和模型检查概念来搜索网络模型上所有可能的攻击,并通过生成攻击图来识别那些违反某些正确性或安全性属性的攻击。通过生成所有可能的攻击,现代的自顶向下的方法本质上不能隔离最重要的少数攻击。这一弱点在未来的网络设置中会加剧,比如5G和物联网(IoT)设置,这些网络预计将拥有数千台(或更多)主机,并随着时间的推移而发展。这造成了一种观点,即攻击图概念本身是不够的,从而阻碍了网络测试的自动化。最近的研究通过应用深度强化学习(RL)将自动攻击图生成重新定位为网络防御的最佳实践。虽然最近对RL渗透测试的研究兴趣迅速增长,但还没有明确的操作使用概念。我们定义并提供了整个战役仿真(WCE)概念的形式化形式。我们将WCE视为一个具有挑战性的问题,同时也是一个使用RL实现网络T&E自动化的框架。该手稿从过去、现在和未来的攻击图生成的角度捕捉了面向强化学习的视角,并作为研究人员和实践者的入门读物。有了WCE,从小型企业到民族国家的组织都可以在低测试成本和低运营中断的情况下建立持续的网络T&E。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards Continuous Cyber Testing with Reinforcement Learning for Whole Campaign Emulation
Modern automated penetration testing uses rule-based procedures and model-checking concepts to search through all possible attacks on network models and identify those that violate some correctness or security property by generating an attack graph. By generating all possible attacks, modern, top-down approaches inherently do not isolate the few attacks that matter the most. This weakness is exacerbated in future network settings like 5G and Internet of Things (IoT) settings where networks are expected to have thousands of hosts (or more) and evolve over time. This has created a perception that the attack graph concept itself is inadequate, in turn hindering the automation of cyber testing. Recent research re-positions automated attack graph generation as a best practice in cyber defense by applying deep reinforcement learning (RL). While recent research into penetration testing with RL has seen a rapid growth in interest, a clear concept of operational use has not been defined. We define and provide formalism for the concept of whole campaign emulation (WCE). We present WCE as both a challenge problem and a framework for automating cyber T&E with RL. This manuscript captures an RL-oriented perspective on the past, present, and future of attack graph generation, and serves as a primer from researchers and practitioners alike. With WCE, organizations from small businesses to nation-states can feasibly institute continuous cyber T&E with low test costs and low disruption to operations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信