Affiliation:
1. School of Automation, Key Laboratory of Modern Measurement and Control, Technology Ministry of Education, Beijing Information Science and Technology University, Beijing 100192, China
2. School of Automation, Beijing Information Science and Technology University, Beijing 100192, China
Abstract
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losses, and continuously improve security strategies. By systematically simulating various attack scenarios, it enables proactive risk assessment and the development of robust security measures. To address the problems of inaccurate path prediction and difficult convergence in the training process of attack path planning, an algorithm which combines attack graph tools (i.e., MulVAL, multi-stage vulnerability analysis language) and the double deep Q network is proposed. This algorithm first constructs an attack tree, searches paths in the attack graph, and then builds a transfer matrix based on depth-first search to obtain all reachable paths in the target system. Finally, the optimal path for target system attack path planning is obtained by using the deep double Q network (DDQN) algorithm. The MulVAL double deep Q network(MDDQN) algorithm is tested in different scale penetration testing environments. The experimental results show that, compared with the traditional deep Q network (DQN) algorithm, the MDDQN algorithm is able to reach convergence faster and more stably and improve the efficiency of attack path planning.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference36 articles.
1. A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment;McKinnel;Comput. Electr. Eng.,2019
2. Almazrouei, O., and Magalingam, P. (2022, January 20–22). The Internet of Things Network Penetration Testing Model Using Attack Graph Analysis. Proceedings of the 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey.
3. An automatic planning-based attack path discovery approach from IT to OT networks;Wang;Secur. Commun. Netw.,2021
4. Lamanna, L., Saetti, A., Serafini, L., Gerevini, A., and Traverso, P. (2021, January 19–26). Online Learning of Action Models for PDDL Planning. Proceedings of the IJCAI, Virtual.
5. PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids;Liu;IEEE Trans. Smart Grid,2022
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献