Skip to main content

2022 | OriginalPaper | Buchkapitel

Deep Reinforcement Learning for FlipIt Security Game

verfasst von : Laura Greige, Peter Chin

Erschienen in: Complex Networks & Their Applications X

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Reinforcement learning has shown much success in games such as chess, backgammon and Go [21, 22, 24]. However, in most of these games, agents have full knowledge of the environment at all times. In this paper, we describe a deep learning model in which agents successfully adapt to different classes of opponents and learn the optimal counter-strategy using reinforcement learning in a game under partial observability. We apply our model to \(\mathsf {FlipIt}\) [25], a two-player security game in which both players, the attacker and the defender, compete for ownership of a shared resource and only receive information on the current state of the game upon making a move. Our model is a deep neural network combined with Q-learning and is trained to maximize the defender’s time of ownership of the resource. Despite the noisy information, our model successfully learns a cost-effective counter-strategy outperforming its opponent’s strategies and shows the advantages of the use of deep reinforcement learning in game theoretic scenarios. We also extend \(\mathsf {FlipIt}\) to a larger action-spaced game with the introduction of a new lower-cost move and generalize the model to n-player \(\mathsf {FlipIt}\).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alpcan, T., Basar, M.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)CrossRefMATH Alpcan, T., Basar, M.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)CrossRefMATH
2.
Zurück zum Zitat Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)CrossRef Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)CrossRef
3.
Zurück zum Zitat Ding, D., Han, Q.-L., Xiang, Y., Ge, X., Zhang, X.-M.: A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275, 1674–1683 (2018)CrossRef Ding, D., Han, Q.-L., Xiang, Y., Ge, X., Zhang, X.-M.: A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275, 1674–1683 (2018)CrossRef
4.
Zurück zum Zitat Falliere, N., Murchu, L.O., Chien, E.: W32. Stuxnet dossier. Symantec White Paper (2011) Falliere, N., Murchu, L.O., Chien, E.: W32. Stuxnet dossier. Symantec White Paper (2011)
5.
Zurück zum Zitat Feng, X., Zheng, Z., Hu, P., Cansever, D., Mohapatra, P.: Stealthy attacks meets insider threats: a three-player game model. In: IEEE Military Communications Conference (MILCOM), pp. 25–30, October 2015 Feng, X., Zheng, Z., Hu, P., Cansever, D., Mohapatra, P.: Stealthy attacks meets insider threats: a three-player game model. In: IEEE Military Communications Conference (MILCOM), pp. 25–30, October 2015
7.
Zurück zum Zitat Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders. In: IEEE Conference on Computer Communications (INFOCOM), pp. 747–755, April 2015 Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders. In: IEEE Conference on Computer Communications (INFOCOM), pp. 747–755, April 2015
8.
Zurück zum Zitat Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs/1412.6980 (2014) Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs/1412.6980 (2014)
9.
Zurück zum Zitat Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertain. 26(2), 231–249 (2003)CrossRefMATH Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertain. 26(2), 231–249 (2003)CrossRefMATH
13.
Zurück zum Zitat Milosevic, N., Dehghantanha, A., Choo, K.-K.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266–274 (2017)CrossRef Milosevic, N., Dehghantanha, A., Choo, K.-K.: Machine learning aided android malware classification. Comput. Electr. Eng. 61, 266–274 (2017)CrossRef
14.
Zurück zum Zitat Mnih, V., et al.: Playing atari with deep reinforcement learning. CoRR, abs/1312.5602 (2013) Mnih, V., et al.: Playing atari with deep reinforcement learning. CoRR, abs/1312.5602 (2013)
15.
Zurück zum Zitat Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015)CrossRef Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015)CrossRef
17.
Zurück zum Zitat Paszke, A., et al.: Automatic differentiation in pytorch. In: Neural Information Processing Systems (2017) Paszke, A., et al.: Automatic differentiation in pytorch. In: Neural Information Processing Systems (2017)
19.
Zurück zum Zitat Schwartz, N.D., Drew, C.: RSA faces angry users after breach. New York Times, page B1, 8 June 2011 Schwartz, N.D., Drew, C.: RSA faces angry users after breach. New York Times, page B1, 8 June 2011
20.
Zurück zum Zitat Silver, D., et al.: Mastering the game of go with deep neural networks and tree search. Nature 529(7587), 484–489 (2016)CrossRef Silver, D., et al.: Mastering the game of go with deep neural networks and tree search. Nature 529(7587), 484–489 (2016)CrossRef
21.
Zurück zum Zitat Silver, D., et al.: A general reinforcement learning algorithm that masters chess, shogi, and go through self-play. Science 362(6419), 1140–1144 (2018)MathSciNetCrossRefMATH Silver, D., et al.: A general reinforcement learning algorithm that masters chess, shogi, and go through self-play. Science 362(6419), 1140–1144 (2018)MathSciNetCrossRefMATH
22.
Zurück zum Zitat Silver, D., et al.: Mastering the game of go without human knowledge. Nature 550(7676), 354–359 (2017)CrossRef Silver, D., et al.: Mastering the game of go without human knowledge. Nature 550(7676), 354–359 (2017)CrossRef
23.
Zurück zum Zitat Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (2018)MATH Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (2018)MATH
24.
Zurück zum Zitat Tesauro, G.: Temporal difference learning and TD-Gammon. Commun. ACM 38(3), 58–68 (1995)CrossRef Tesauro, G.: Temporal difference learning and TD-Gammon. Commun. ACM 38(3), 58–68 (1995)CrossRef
25.
Zurück zum Zitat van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: the game of “stealthy takeover’’. J. Cryptology 26(4), 655–713 (2013)MathSciNetCrossRefMATH van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: the game of “stealthy takeover’’. J. Cryptology 26(4), 655–713 (2013)MathSciNetCrossRefMATH
26.
Zurück zum Zitat Wang, Z., et al.: Sample efficient actor-critic with experience replay. CoRR abs/1611.01224 (2016) Wang, Z., et al.: Sample efficient actor-critic with experience replay. CoRR abs/1611.01224 (2016)
27.
28.
Zurück zum Zitat Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. ArXiv abs/1801.06275 (2018) Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. ArXiv abs/1801.06275 (2018)
Metadaten
Titel
Deep Reinforcement Learning for FlipIt Security Game
verfasst von
Laura Greige
Peter Chin
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-93409-5_68

Premium Partner