Author:
Li Yang,Wang Yongjie,Xiong Xinli,Zhang Jingye,Yao Qian
Abstract
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research hotspot. However, the existing intelligent penetration test simulation environments only focus on the exploits of target hosts by the penetration tester agent’s actions while ignoring the important role of social engineering in the penetration test in reality. In addition, the construction of the existing penetration test simulation environment is based on the traditional network graph model without integrating security factors and attributes, and it is difficult to express the interaction between the penetration tester and the target network. This paper constructs an improved network graph model for penetration test (NMPT), which integrates the relevant security attributes of the penetration test. The NMPT model lays the foundation for extending the penetration tester’s social engineering actions. Then, we propose an intelligent penetration test method that incorporates social engineering factors (SE-AIPT) based on the Markov Decision Process. We adopt several mainstream reinforcement learning algorithms to train attack agents. The experiments show that the SE-AIPT method could vividly model the penetration tester agent’s social engineering actions, which effectively improves the reality of the simulation environment. Moreover, the penetration tester agent shows superior effects in the attack path discovery in the intelligent penetration test simulation environment constructed by the SE-AIPT method.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference27 articles.
1. Autonomous security analysis and penetration testing;Chowdhary;Proceedings of the 2020 16th International Conference on Mobility, Sensing and Networking (MSN),2020
2. Domain-independent intelligent planning technology and its application to automated penetration testing oriented attack path discovery;Yichao;J. Electron. Inf. Technol.,2020
3. Avoiding the weaknesses of a penetration test
4. From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
5. Incorporating Deception into CyberBattleSim for Autonomous Defense;Walter;arXiv,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献