Author:
Ghanem Mohamed C.,Chen Thomas M.,Nepomuceno Erivelton G.
Abstract
AbstractPenetration testing (PT) is a method for assessing and evaluating the security of digital assets by planning, generating, and executing possible attacks that aim to discover and exploit vulnerabilities. In large networks, penetration testing becomes repetitive, complex and resource consuming despite the use of automated tools. This paper investigates reinforcement learning (RL) to make penetration testing more intelligent, targeted, and efficient. The proposed approach called Intelligent Automated Penetration Testing Framework (IAPTF) utilizes model-based RL to automate sequential decision making. Penetration testing tasks are treated as a partially observed Markov decision process (POMDP) which is solved with an external POMDP-solver using different algorithms to identify the most efficient options. A major difficulty encountered was solving large POMDPs resulting from large networks. This was overcome by representing networks hierarchically as a group of clusters and treating each cluster separately. This approach is tested through simulations of networks of various sizes. The results show that IAPTF with hierarchical network modeling outperforms previous approaches as well as human performance in terms of time, number of tested vectors and accuracy, and the advantage increases with the network size. Another advantage of IAPTF is the ease of repetition for retesting similar networks, which is often encountered in real PT. The results suggest that IAPTF is a promising approach to offload work from and ultimately replace human pen testing.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference28 articles.
1. Abu-Dabaseh, F., & Alshammari, E. (2018). Automated penetration testing : an overview computer science and information technology.
2. Al-Emran, M. (2015). Hierarchical reinforcement learning: a survey. International Journal of Computing and Digital Systems, 4, 2210–142. https://doi.org/10.12785/ijcds/040207.
3. Babenko, L., & Kirillov, A. (2022). Development of automated malware detection system. izvestiya SFedu. Engineering Sciences:153–167. https://doi.org/10.18522/2311-3103-2021-7-153-167.
4. Backes, M., Hoffmann, J., Künnemann, R, Speicher, P., & Steinmetz, M. (2017). Simulated penetration testing and mitigation analysis. arXiv:1705.05088.
5. Bacudio, A., Yuan, X., Chu, B., & Jones, M. (2011). An overview of penetration testing. International Journal of Network Security & Its Applications, 3 (1-2), 19–38. https://doi.org/10.5121/ijnsa.2011.3602.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献