MULTI-ARMED BANDIT MODELS FOR EXPLOITATION OF CYBER NETWORKS
Author
Chan, Baixian Alvin
Date
2021-09Advisor
Szechtman, Roberto
Grant, James, Lancaster University
Second Reader
Kress, Moshe
Metadata
Show full item recordAbstract
Computer networks are often the target of cyber attacks carried out by malevolent agents, to either disable critical system operations or to surreptitiously gain access to sensitive data. The asymmetric and covert nature of cyber attacks has led to their increased prevalence, where high-impact attacks on critical infrastructure can be launched with minimal resources. We consider the setup of a network switch and its connected nodes, and use multi-armed bandit models as a framework to formulate a network attack strategy to maximize expected rewards earned over time. Such models present upper confidence bound–based approaches on the cumulative regret, through optimal choice of possible attacker actions over a finite time horizon and bounded action space. We evaluate relevant multi-armed bandit models and develop our own algorithm. Numerical simulations consistently suggest that low cumulative regret is achieved over time for our algorithm in comparison to the other algorithms evaluated. We thus present a stylized model for strategic network exploitation, with the attacker having no prior knowledge of the rewards of various nodes in a network with a star topology. This enables effective network defenses to be continually developed, based on specific network topologies and reward feedback mechanisms.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Network transformations and some applications
Cheong, Yue Pui (1975-12);The growing number of large scale applications of network models and the availability of very fast solution codes make it attractive to formulate problems as networks whenever such models are adequate for the purpose. ...