Full Text:  <2512>

Summary:  <1335>

CLC number: TP393.08

On-line Access: 2019-10-08

Received: 2018-09-03

Revision Accepted: 2019-02-01

Crosschecked: 2019-09-04

Cited: 0

Clicked: 4514

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Yi-chao Zang

http://orcid.org/0000-0002-1791-586X

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering 

Accepted manuscript available online (unedited version)


NIG-AP: a new method for automated penetration testing


Author(s):  Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang

Affiliation(s):  State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China; more

Corresponding email(s):  zangyeechao@sina.com

Key Words:  Penetration testing, Reinforcement learning, Classical planning, Partially observable Markov decision process


Share this article to: More <<< Previous Paper|Next Paper >>>

Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang. NIG-AP: a new method for automated penetration testing[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1800532

@article{title="NIG-AP: a new method for automated penetration testing",
author="Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang",
journal="Frontiers of Information Technology & Electronic Engineering",
year="in press",
publisher="Zhejiang University Press & Springer",
doi="https://doi.org/10.1631/FITEE.1800532"
}

%0 Journal Article
%T NIG-AP: a new method for automated penetration testing
%A Tian-yang Zhou
%A Yi-chao Zang
%A Jun-hu Zhu
%A Qing-xian Wang
%J Frontiers of Information Technology & Electronic Engineering
%P 1277-1288
%@ 2095-9184
%D in press
%I Zhejiang University Press & Springer
doi="https://doi.org/10.1631/FITEE.1800532"

TY - JOUR
T1 - NIG-AP: a new method for automated penetration testing
A1 - Tian-yang Zhou
A1 - Yi-chao Zang
A1 - Jun-hu Zhu
A1 - Qing-xian Wang
J0 - Frontiers of Information Technology & Electronic Engineering
SP - 1277
EP - 1288
%@ 2095-9184
Y1 - in press
PB - Zhejiang University Press & Springer
ER -
doi="https://doi.org/10.1631/FITEE.1800532"


Abstract: 
penetration testing offers strong advantages in the discovery of hidden vulnerabilities in a network and assessing network security. However, it can be carried out by only security analysts, which costs considerable time and money. The natural way to deal with the above problem is automated penetration testing, the essential part of which is automated attack planning. Although previous studies have explored various ways to discover attack paths, all of them require perfect network information beforehand, which is contradictory to realistic penetration testing scenarios. To vividly mimic intruders to find all possible attack paths hidden in a network from the perspective of hackers, we propose a network information gain based automated attack planning (NIG-AP) algorithm to achieve autonomous attack path discovery. The algorithm formalizes penetration testing as a Markov decision process and uses network information to obtain the reward, which guides an agent to choose the best response actions to discover hidden attack paths from the intruder’s perspective. Experimental results reveal that the proposed algorithm demonstrates substantial improvement in training time and effectiveness when mining attack paths.

NIG-AP:一种自动化渗透测试新方法

摘要:渗透测试在发现网络脆弱性与评估网络安全状态方面发挥着重要作用。但是,渗透测试过程只能由安全专家进行,造成了大量时间、人力开销。自动化渗透测试为解决该问题提供了思路,其中最为关键的是攻击规划。不少学者对攻击路径发现进行了大量深入研究,但是大都基于完备的网络拓扑信息,这与实际渗透测试情况不符。为了从攻击者视角发现网络中存在的所有攻击路径,提出一种基于网络信息增益的攻击规划算法(NIG-AP),该算法将渗透测试过程形式化为马尔科夫决策过程,并利用网络信息构建回报函数,并指导代理从入侵者角度发现隐藏的攻击路径,选择最佳响应操作。实验结果表明本文提出的算法能够有效提高攻击路径发现效率。

关键词组:渗透测试;强化学习;经典规划;部分观测的马尔科夫决策过程

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Alexander Pretschner AS, 2017. Automated Attack Planning Using a Partially Observable Model for Penetration Testing of Industrial Control Systems. MS Thesis, Technische Universität München, München, Germany.

[2]Backes M, Hoffmann J, Künnemann R, et al., 2017. Simulated penetration testing and mitigation analysis. https://arxiv.org/abs/1705.05088v1

[3]Baulcombe DC, 1999. Fast forward genetics based on virus-induced gene silencing. Curr Opin Plant Biol, 2(2):109-113.

[4]Beale J, Meer H, van der Walt C, et al., 2004. Nessus Network Auditing: Jay Beale Open Source Security Series. Elsevier, Amsterdam, the Netherlands.

[5]Chad‘es I, Chapron G, Cros MJ, et al., 2014. MDPtoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems. Ecography, 37(9):916-920.

[6]Core Security, 2019. Core Impact Penetration System. https://www.secureauth.com/products/penetration-testing/core-impact [Accessed on Feb. 23, 2019].

[7]Fox M, Long D, 2003. PDDL2.1: an extension to PDDL for expressing temporal planning domains. J Artif Intell Res, 20:61-124.

[8]Futoransky A, Notarfrancesco L, Richarte G, et al., 2010. Building computer network attacks. https://arxiv.org/abs/1006.1916

[9]Holik F, Horalek J, Marik O, et al., 2014. Effective penetration testing with metasploit framework and methodologies. IEEE 15th Int Symp on Computational Intelligence and Informatics, p.237-242.

[10]Khan S, Parkinson S, 2017. Towards automated vulnerability assessment. 27th Int Conf on Automated Planning and Scheduling, p.33-40.

[11]Kingma DP, Ba J, 2014. Adam: a method for stochastic optimization. https://arxiv.org/abs/1412.6980

[12]Kurniawati H, Hsu D, Lee WS, 2008. SARSOP: efficient point-based POMDP planning by approximating optimally reachable belief spaces. In: Brock O, Trinkle J, Ramos F (Eds.), Robotics: Science and Systems IV. MIT Press, Massachusetts, USA, Chapter 10.

[13]Lee C, Lee GG, 2006. Information gain and divergence-based feature selection for machine learning-based text categorization. Inform Process Manag, 42(1):155-165.

[14]Liang JY, Shi ZZ, 2004. The information entropy, rough entropy and knowledge granulation in rough set theory. Int J Uncert Fuzzy Knowl Syst, 12(1):37-46.

[15]Mnih V, Kavukcuoglu K, Silver D, et al., 2013. Playing Atari with deep reinforcement learning. https://arxiv.org/abs/1312.5602

[16]Mnih V, Kavukcuoglu K, Silver D, et al., 2015. Human-level control through deep reinforcement learning. Nature, 518(7540):529-533.

[17]Obes JL, Sarraute C, Richarte G, 2013. Attack planning in the real world. https://arxiv.org/abs/1306.4044

[18]Roberts M, Howe A, Ray I, et al., 2011. Personalized vulnerability analysis through automated planning. Proc Int Joint Conf on Artificial Intelligence, p.50-57.

[19]Samant N, 2011. Automated Penetration Testing. MS Thesis, San Jose State University, California, USA.

[20]Sarraute C, Richarte G, Lucángeli Obes J, 2011. An algorithm to find optimal attack paths in nondeterministic scenarios. 4th ACM Workshop on Security and Artificial Intelligence, p.71-80.

[21]Sarraute C, Buffet O, Hoffmann J, 2012. POMDPs make better hackers: accounting for uncertainty in penetration testing. 26th AAAI Conf on Artificial Intelligence, p.1816-1824 .

[22]Sarraute C, Buffet O, Hoffmann J, 2013. Penetration testing == POMDP solving? https://arxiv.org/abs/1306.4714

[23]Schneier B, 1999. Attack trees. Dr Dobb's J, 24(12):21-29.

[24]Sheyner O, Haines J, Jha S, et al., 2002. Automated generation and analysis of attack graphs. IEEE Symp on Security and Privacy, p.273-284.

[25]Shmaryahu D, Shani G, Hoffmann J, et al., 2017. Partially observable contingent planning for penetration testing. 1st Int Workshop on Artificial Intelligence in Security, p.33-40.

[26]Stefinko Y, Piskuzub A, 2017. Theory of modern penetration testing expert system. Inform Process Syst, 148(2):129-133.

[27]Steinmetz M, 2016. Critical constrained planning and an application to network penetration testing. 26th Int Conf on Automated Planning and Scheduling, p.141-144.

[28]Sutton RS, Barto AG, 1998. Reinforcement Learning: an Introduction. MIT Press, Cambridge, London.

[29]Szepesvári C, 2010. Algorithms for Reinforcement Learning. Morgan & Claypool Publishers, San Rafael, Argentina.

[30]Zhuang YT, Wu F, Chen C, et al., 2017. Challenges and opportunities: from big data to knowledge in AI 2.0. Front Inform Technol Electron Eng, 18(1):3-14.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE