Abstract
The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter, we explore what can be learnt about cyber adversaries from observable data, such as intrusion alerts, network traffic, and threat intelligence feeds. We describe the challenges of building autonomous cyber defense agents, such as learning from noisy observables with no ground truth, and the brittle nature of deep learning based agents that can be easily evaded by adversaries. We illustrate three state-of-the-art autonomous cyber defense agents that model adversary behavior from traffic induced observables without a priori expert knowledge or ground truth labels. We close with recommendations and directions for future work.
Original language | English |
---|---|
Title of host publication | Autonomous Intelligent Cyber Defense Agent (AICA) |
Subtitle of host publication | A Comprehensive Guide |
Editors | Alexander Kott |
Publisher | Springer |
Chapter | 6 |
Pages | 105-132 |
Number of pages | 28 |
Volume | 87 |
Edition | 1 |
ISBN (Electronic) | 978-3-031-29271-2 |
ISBN (Print) | 978-3-031-29268-2 |
DOIs | |
Publication status | Published - 2023 |
Publication series
Name | Advances in Information Security |
---|---|
Publisher | Springer Cham |
ISSN (Print) | 1568-2633 |
ISSN (Electronic) | 2512-2193 |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Adversary behavior
- machine learning
- behavior modeling
- intrusion alerts
- statistical models