Show simple item record

dc.contributor.authorPozdniakov, K
dc.contributor.authorAlonso, E
dc.contributor.authorStankovic, V
dc.contributor.authorTam, K
dc.contributor.authorJones, Kevin
dc.date.accessioned2020-05-20T10:10:01Z
dc.date.issued2020-06-15
dc.identifier.isbn9781728166902
dc.identifier.urihttp://hdl.handle.net/10026.1/15693
dc.descriptionNo embargo required
dc.description.abstract

A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats. In this paper, we attempt to assist human analysts by automating a single host penetration attack. To do so, a smart agent performs different attack sequences to find vulnerabilities in a target system. As it does so, it accumulates knowledge, learns new attack sequences and improves its own internal penetration testing logic. As a result, this agent (AgentPen for simplicity) is able to successfully penetrate hosts it has never interacted with before. A computer security administrator using this tool would receive a comprehensive, automated sequence of actions leading to a security breach, highlighting potential vulnerabilities, and reducing the amount of menial tasks a typical penetration tester would need to execute. To achieve autonomy, we apply an unsupervised machine learning algorithm, Q-learning, with an approximator that incorporates a deep neural network architecture. The security audit itself is modelled as a Markov Decision Process in order to test a number of decision-making strategies and compare their convergence to optimality. A series of experimental results is presented to show how this approach can be effectively used to automate penetration testing using a scalable, i.e. not exhaustive, and adaptive approach.

dc.format.extent1-8
dc.language.isoen
dc.publisherIEEE
dc.subjectPentesting
dc.subjectaudit
dc.subjectQ-learning
dc.subjectreinforcement learning
dc.subjectdeep neural network
dc.titleSmart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000847358100017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2020-06-15
plymouth.date-finish2020-06-19
plymouth.volume00
plymouth.conference-nameIEEE Cyber Science
plymouth.publication-statusPublished
plymouth.journal2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
dc.identifier.doi10.1109/cybersa49311.2020.9139683
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics/SoECM - Manual
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-04-16
dc.rights.embargodate2020-5-21
rioxxterms.versionofrecord10.1109/cybersa49311.2020.9139683
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-06-15
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV