A Reinforcement Learning Approach for Attack Graph Analysis
Title | A Reinforcement Learning Approach for Attack Graph Analysis |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Yousefi, M., Mtetwa, N., Zhang, Y., Tianfield, H. |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Keywords | approximate analysis approach, attack graph, attack graph analysis, attack graph size, Attack Graphs, Big Data, composability, computer network security, computer security, Conferences, control theory, cyber security, data privacy, graph theory, Handheld computers, Internet, learning (artificial intelligence), Metrics, multistage vulnerability analysis, possible attack routes, pubcrawl, q-learning, reinforcement learning, reinforcement learning approach, resilience, Resiliency, security, security of data, simplified graph, transition graph |
Abstract | Attack graph approach is a common tool for the analysis of network security. However, analysis of attack graphs could be complicated and difficult depending on the attack graph size. This paper presents an approximate analysis approach for attack graphs based on Q-learning. First, we employ multi-host multi-stage vulnerability analysis (MulVAL) to generate an attack graph for a given network topology. Then we refine the attack graph and generate a simplified graph called a transition graph. Next, we use a Q-learning model to find possible attack routes that an attacker could use to compromise the security of the network. Finally, we evaluate the approach by applying it to a typical IT network scenario with specific services, network configurations, and vulnerabilities. |
URL | https://ieeexplore.ieee.org/document/8455909 |
DOI | 10.1109/TrustCom/BigDataSE.2018.00041 |
Citation Key | yousefi_reinforcement_2018 |
- Handheld computers
- transition graph
- simplified graph
- security of data
- Resiliency
- resilience
- reinforcement learning approach
- Reinforcement learning
- q-learning
- pubcrawl
- possible attack routes
- multistage vulnerability analysis
- Metrics
- learning (artificial intelligence)
- internet
- Control Theory
- graph theory
- data privacy
- cyber security
- Conferences
- computer security
- computer network security
- composability
- Big Data
- attack graphs
- attack graph size
- attack graph analysis
- attack graph
- approximate analysis approach
- security