Multi-armed bandit models of network intrusion in the cyber domain
dc.contributor.advisor | Szechtman, Roberto | |
dc.contributor.advisor | Yoshida, Ruriko | |
dc.contributor.author | Kronzilber, Dor | |
dc.date | September 2017 | |
dc.date.accessioned | 2018-02-05T19:07:40Z | |
dc.date.available | 2018-02-05T19:07:40Z | |
dc.date.issued | 2017-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/56715 | |
dc.description.abstract | We model attacks against computer networks in the cyber domain from the attacker’s point of view. We consider an attacker with limited resources and time, whose goal is to maximize the expected reward earned by exploiting infected computers, while considering the risks. A computer network is represented as a graph consisting of computers or routers, where each computer has unknown expected reward and the routers connect sub-networks of computers. At time zero the attacker starts from an infected computer, called the “home computer,” while all the other computers in the network are not infected. In any given period, the attacker can try to earn a reward by exploiting the subset of infected computers, or can choose to expand by infecting adjacent computers and routers, which does not accrue any reward. However, each infected computer must be connected through other infected computers all the way to the “home computer” for the attacker to be able to exploit it (but this connectivity may be lost when attacks are detected). For the linear network model, which is a worst-case scenario from the attacker point of view, we find that the optimal number of nodes to attempt to infect is of the order square root of the time when the network is sufficiently large. Also, we determine a critical relationship between the attacker’s probability to infect a new node and the probability of detection. When this critical condition is met, the attacker should not try to infect any additional nodes. | en_US |
dc.description.uri | http://archive.org/details/multiarmedbandit1094556715 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.title | Multi-armed bandit models of network intrusion in the cyber domain | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Kress, Moshe | |
dc.contributor.department | Operations Research (OR) | en_US |
dc.subject.author | multi-armed bandit | en_US |
dc.subject.author | cyber intrusion | en_US |
dc.subject.author | computer network | en_US |
dc.subject.author | advanced persistent threat | en_US |
dc.description.service | Major, Israel Defense Forces | en_US |
etd.thesisdegree.name | Master of Science in Operations Research | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Operations Research | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. | |
dc.identifier.curriculumcode | 360 (Operations Analysis) |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.