Learning About the Adversary

A. Nadeem, S.E. Verwer, Shanchieh Jay Yang

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

75 Downloads (Pure)

Abstract

The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter, we explore what can be learnt about cyber adversaries from observable data, such as intrusion alerts, network traffic, and threat intelligence feeds. We describe the challenges of building autonomous cyber defense agents, such as learning from noisy observables with no ground truth, and the brittle nature of deep learning based agents that can be easily evaded by adversaries. We illustrate three state-of-the-art autonomous cyber defense agents that model adversary behavior from traffic induced observables without a priori expert knowledge or ground truth labels. We close with recommendations and directions for future work.
Original languageEnglish
Title of host publicationAutonomous Intelligent Cyber Defense Agent (AICA)
Subtitle of host publicationA Comprehensive Guide
EditorsAlexander Kott
PublisherSpringer
Chapter6
Pages105-132
Number of pages28
Volume87
Edition1
ISBN (Electronic)978-3-031-29271-2
ISBN (Print)978-3-031-29268-2
DOIs
Publication statusPublished - 2023

Publication series

NameAdvances in Information Security
PublisherSpringer Cham
ISSN (Print)1568-2633
ISSN (Electronic)2512-2193

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Adversary behavior
  • machine learning
  • behavior modeling
  • intrusion alerts
  • statistical models

Fingerprint

Dive into the research topics of 'Learning About the Adversary'. Together they form a unique fingerprint.

Cite this