Computer Science ›› 2021, Vol. 48 ›› Issue (5): 301-307.doi: 10.11896/jsjkx.200800174

• Information Security • Previous Articles     Next Articles

Team Cooperative Attack Planning Based on Multi-agent Joint Decision

ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian   

  1. Information Engineering University,Zhengzhou 450001,China
    National Digital Switching System Engineering & Technological Research Center,Zhengzhou 450001,China
  • Received:2020-08-27 Revised:2020-10-30 Online:2021-05-15 Published:2021-05-09
  • About author:ZHOU Tian-yang,born in 1979,asso-ciate professor.His main research interests include software vulnerability ana-lysis,virtualization-based security technology and application,penetration test,fundamental study of network modeling and simulation,and cyber security assessment.

Abstract: Automated penetration testing can greatly reduce the cost of penetration testing by automating the process of manually finding possible attack paths.Existing methods mainly use a single agent to perform attack tasks,which leads to long execution of attack actions and low penetration efficiency.If multi-agent cooperative attack is considered,the state space scale of planning problem will grow exponentially due to the multi-dimensional local state of each agent.Aiming at the above problems,a team cooperative attack planning method based on multi-agent jointdecision is proposed.Firstly,the multi-agent cooperative attack path planning problem is transformed into the attack target assignment problem under the jointdecision constraints,and themulti-agent centralized decision-making mode is established.Secondly,the joint decision vector matrix JDVM is used to calculate the penetration attack reward based on the CDSO-CAP model,and the greedy strategy is used to search the optimal target of attack.The experimental results show that compared with the single agent planning method,the proposed method has similar algorithm convergence with shorter execution rounds.Thus it is more suitable for rapid attack planning in multi-target network scenarios.

Key words: Agent, Attack planning, Automation, Joint decision, Penetration test, Team collaboration

CLC Number: 

  • TP393.08
[1]OBES J L,SARRAUTE C,RICHARTE G.Attack planning inthe real world[J].arXiv:1306.4044,2013.
[2]SARRAUTE C,RICHARTE G,OBESJ L.AN algorithm to find optimal attack paths in nondeterministic scenarios[C]//Proceedings of th 4th ACM Workshop on Security and Artificial Intelligence.ACM,2011:71-80.
[3]SARRAUTE C,BUFFET O,HOFFMANN J.POMDPs makebetter hackers:Accounting for uncertainty in penetration testing[C]//Twenty-Sixth AAAI Conference on Artificail Intelligence.2012.
[4]SHMARYAHU D,SHANI G,HOFFMANN J,et al.Partially observable contingent planning for penetration testing[C]//IWAISe:First International Workshop on Artificail Intellijgence in Security.2017,33.
[5]MCLENNAN A .The expected number of Nash equilibria of a normal form game[J].Econometrica,2005,73(1):141-174.
[6]BOUTILIER C.Planning,learning and coordination in multi-agent decision processes[C]//Proceedings of the 6th conference on Theoretical aspects of rationality and knowledge.Morgan Kaufmann Publishers Inc.1996:195-210.
[7]MUSLINER D J,DURFEE E H,WU J,et al.Coordinated Plan Management Using Multiagent MDPs[C]//AAAI Spring Symposium:DIstributed Plan and Schedule Management.2006:73-70.
[8]ONTANON S,BURO M.Adversarial hierachical-task network planning for complex real-time games[C]//Twenty-Fourth International Joint Conference on Artificail Intelligence.2015.
[9]SARRAUTE C,BUFFET O,HOFFMANN J.Penetration Testing==POMDP Solving?[J].arXiv:1306.4714,2013.
[10]KOTENKO I.Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet[C]//the 19th European Simulation Multiconference “Simulation in wider Europe”.2005.
[11]ROTH M,SIMMONS R,VELOSO M.What to communicate? Execution-time decision in multi-agent POMDPs[M]//Distributed Autonomous Robotic Systems 7.Springer,Tokyo,2006:177-186.
[12]ZHANG C,LESSER V.Coordinated multi-agent reinforcement learning in networked distributed POMDPs[C]//Proceedings of the 25th AAAI Conference on Artificial Intelligence.San Francisco,America,2011:764-770.
[13]ZHOU T Y,ZANG Y C,ZHU J H,et al.NIG-AP:a new me-thod for automated penetration testing[J].Frontiers of Information Technology & Electronic Engineering,2019,20(9):1277-1298.
[1] SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256.
[2] WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li. Design and Implementation of RPA System Based on UIA Interface [J]. Computer Science, 2022, 49(8): 225-229.
[3] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
[4] ZHANG Ming-xin. Conceptual Model for Large-scale Social Simulation [J]. Computer Science, 2022, 49(4): 16-24.
[5] WANG Qi, WANG Gang-qiao, CHEN Yong-qiang, LIU Yi. Integrated Modeling Method and Application System for Social Computing [J]. Computer Science, 2022, 49(4): 25-29.
[6] ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46.
[7] GAO Feng-yue, WANG Yan, ZHU Tie-lan. Resilient Distributed State Estimation Algorithm [J]. Computer Science, 2021, 48(5): 308-312.
[8] ZUO Jian-kai, WU Jie-hong, CHEN Jia-tong, LIU Ze-yuan, LI Zhong-zhi. Study on Heterogeneous UAV Formation Defense and Evaluation Strategy [J]. Computer Science, 2021, 48(2): 55-63.
[9] LIU Fang, HONG Mei, WANG Xiao, GUO Dan, YANG Zheng-hui, HUANG Xiao-dan. Performance Analysis of Randoop Automated Unit Test Generation Tool for Java [J]. Computer Science, 2020, 47(9): 24-30.
[10] LI Li. Classification Algorithm of Distributed Data Mining Based on Judgment Aggregation [J]. Computer Science, 2020, 47(6A): 450-456.
[11] REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638.
[12] XU Zi-xi, MAO Xin-jun, YANG Yi, LU Yao. Modeling and Simulation of Q&A Community and Its Incentive Mechanism [J]. Computer Science, 2020, 47(6): 32-37.
[13] WU Tian-tian,WANG Jie. Belief Coordination for Multi-agent System Based on Possibilistic Answer Set Programming [J]. Computer Science, 2020, 47(2): 201-205.
[14] ZHANG Hong-ying,SHEN Rong-miao,LUO Qian. Optimization of Aircraft Taxiing Strategy Based on Multi-agent [J]. Computer Science, 2020, 47(2): 306-312.
[15] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning [J]. Computer Science, 2019, 46(8): 1-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!