Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-54129-2_43guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments

Published: 25 September 2023 Publication History

Abstract

One of the fundamental challenges in developing autonomous cybersecurity agents (AICA) is providing them with appropriate training environments for skills acquisition and evaluation. Current reinforcement learning (RL) algorithms rely on myriads of training runs to instill proper behavior, and this is reasonably achievable only within a simulated environment. In this paper, we explore the topic of simulation models and environments for RL and present an assessment framework to compare simulation models designed for simulating cyberattack scenarios. We examine four existing simulation tools, including a new one by the authors of the paper, and discuss their properties, particularly in terms of deployability, to support RL-based AICA. In the example of complex scenarios, we compare the two most sophisticated simulation tools and discuss their strengths.

References

[1]
Andrew, A., Spillard, S., Collyer, J., Dhir, N.: Developing optimal causal cyber-defence agents via cyber security simulation (2022).
[2]
Bodeau, D., Graubart, R., Heinbockel, W.: Mapping the cyber terrain: Enabling cyber defensibility claims and hypotheses to be stated and evaluated with greater rigor and utility. Tech. rep., The MITRE Corporation., Bedford, MA, USA (2013). https://www.mitre.org/sites/default/files/publications/mapping-cyber-terrain-13-4175.pdf
[3]
Brockman, G., Cheung, V., Pettersson, L., Schneider, J., Schulman, J., Tang, J., Zaremba, W.: Openai gym (2016).
[4]
Drasar, M.: Cyst api documentation (2023), https://muni.cz/go/cyst/
[5]
Li, L., Fayad, R., Taylor, A.: Cygil: A cyber gym for training autonomous agents over emulated network systems (2021).
[6]
Microsoft: Cyberbattlesim (2021). https://github.com/microsoft/cyberbattlesim, created by Christian Seifert, Michael Betser, William Blum, James Bono, Kate Farris, Emily Goren, Justin Grana, Kristian Holsheimer, Brandon Marken, Joshua Neil, Nicole Nichols, Jugal Parikh, Haoran Wei
[7]
MITRE: Caldera: A scalable, adversary emulation platform (2022). https://caldera.mitre.org
[8]
Molina-Markham, A., Miniter, C., Powell, B., Ridley, A.: Network environment design for autonomous cyberdefense (2021).
[9]
Moskal, S., Yang, S.J.: Cyberattack action-intent-framework for mapping intrusion observables. CoRR abs/2002.07838 (2020). https://arxiv.org/abs/2002.07838
[10]
Moskal S, Yang SJ, and Kuhl ME Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach J. Defense Model. Simul. 2018 15 1 13-29
[11]
Raymond, D., Cross, T., Conti, G., Nowatkowski, M.: Key terrain in cyberspace: Seeking the high ground. In: 2014 6th International Conference On Cyber Conflict (CyCon 2014), pp. 287–300. IEEE, Tallinn, Estonia (2014).
[12]
Rush, G., Tauritz, D.R., Kent, A.D.: Coevolutionary agent-based network defense lightweight event system (candles). In: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation. p. 859–866. GECCO Companion ’15, Association for Computing Machinery, New York, NY, USA (2015).
[13]
Schoonover, K., et al.: Galaxy: A network emulation framework for cybersecurity. In: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18). USENIX Association, Baltimore, MD (Aug 2018). https://www.usenix.org/conference/cset18/presentation/schoonover
[14]
Standen, M., Lucas, M., Bowman, D., Richer, T.J., Kim, J., Marriott, D.: Cyborg: a gym for the development of autonomous cyber agents (2021). https://doi.org/10.48550/ARXIV.2108.09118
[15]
The Technical Cooperation Program: TTCP CAGE Challenge 2 (2022). https://github.com/cage-challenge/cage-challenge-2

Cited By

View all
  • (2024)Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure SpecificationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664523(1-11)Online publication date: 30-Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
Sep 2023
784 pages
ISBN:978-3-031-54128-5
DOI:10.1007/978-3-031-54129-2
  • Editors:
  • Sokratis Katsikas,
  • Habtamu Abie,
  • Silvio Ranise,
  • Luca Verderame,
  • Enrico Cambiaso,
  • Rita Ugarelli,
  • Isabel Praça,
  • Wenjuan Li,
  • Weizhi Meng,
  • Steven Furnell,
  • Basel Katt,
  • Sandeep Pirbhulal,
  • Ankur Shukla,
  • Michele Ianni,
  • Mila Dalla Preda,
  • Kim-Kwang Raymond Choo,
  • Miguel Pupo Correia,
  • Abhishta Abhishta,
  • Giovanni Sileno,
  • Mina Alishahi,
  • Harsha Kalutarage,
  • Naoto Yanai

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 25 September 2023

Author Tags

  1. simulation environments
  2. autonomous decision-making
  3. cybersecurity

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure SpecificationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664523(1-11)Online publication date: 30-Jul-2024

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media