Adversarial Deep Reinforcement Learning for Cyber Security in Software Defined Networks

AI-generated keywords: Autonomous Security Deep Reinforcement Learning Software Defined Networks Double Deep Q-Networks Neural Episodic Control

AI-generated Key Points

  • The paper explores the impact of leveraging autonomous offensive approaches in Deep Reinforcement Learning (DRL) for autonomous security in Software Defined Networks (SDN).
  • Two algorithms, Double Deep Q-Networks (DDQN) and Neural Episodic Control to Deep Q-Network (NEC2DQN or N2D), are compared.
  • The attacker has full observability of the environment and access to a causative attack that manipulates state.
  • Two games are played with roles reversed: DDQN as defender and N2D as attacker, once without an active causative attack and once with an active causative attack.
  • Three sets of game results are recorded, each consisting of 10 game runs.
  • Small parameter changes made to the algorithms result in growth in the attacker's capability.
  • Both algorithms demonstrate their ability to defend against adversarial attacks according to their strengths.
  • Leveraging autonomous offensive approaches can enhance deep reinforcement learning for autonomous security in SDNs.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Luke Borchjes, Clement Nyirenda, Louise Leenen

License: CC BY 4.0

Abstract: This paper focuses on the impact of leveraging autonomous offensive approaches in Deep Reinforcement Learning (DRL) to train more robust agents by exploring the impact of applying adversarial learning to DRL for autonomous security in Software Defined Networks (SDN). Two algorithms, Double Deep Q-Networks (DDQN) and Neural Episodic Control to Deep Q-Network (NEC2DQN or N2D), are compared. NEC2DQN was proposed in 2018 and is a new member of the deep q-network (DQN) family of algorithms. The attacker has full observability of the environment and access to a causative attack that uses state manipulation in an attempt to poison the learning process. The implementation of the attack is done under a white-box setting, in which the attacker has access to the defender's model and experiences. Two games are played; in the first game, DDQN is a defender and N2D is an attacker, and in second game, the roles are reversed. The games are played twice; first, without an active causative attack and secondly, with an active causative attack. For execution, three sets of game results are recorded in which a single set consists of 10 game runs. The before and after results are then compared in order to see if there was actually an improvement or degradation. The results show that with minute parameter changes made to the algorithms, there was growth in the attacker's role, since it is able to win games. Implementation of the adversarial learning by the introduction of the causative attack showed the algorithms are still able to defend the network according to their strengths.

Submitted to arXiv on 09 Aug. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2308.04909v1

This paper explores the impact of leveraging autonomous offensive approaches in Deep Reinforcement Learning (DRL) to train more robust agents for autonomous security in Software Defined Networks (SDN). The authors compare two algorithms, Double Deep Q-Networks (DDQN) and Neural Episodic Control to Deep Q-Network (NEC2DQN or N2D), with NEC2DQN being a new member of the deep q-network (DQN) family of algorithms proposed in 2018. The attacker in this study has full observability of the environment and access to a causative attack that manipulates state in an attempt to disrupt the learning process. The attack is implemented under a white-box setting, where the attacker has access to the defender's model and experiences. Two games are played: in the first game, DDQN acts as the defender while N2D plays as the attacker, and in the second game, their roles are reversed. The games are played twice: once without an active causative attack and once with an active causative attack. Three sets of game results are recorded, with each set consisting of 10 game runs. The before and after results are compared to determine if there was any improvement or degradation. The results show that even with small parameter changes made to the algorithms, there is growth in the attacker's capability as it becomes capable of winning games. However, despite these adversarial attacks both algorithms demonstrate their ability to defend against them according to their strengths. In conclusion, this study highlights how leveraging autonomous offensive approaches can enhance deep reinforcement learning for autonomous security in SDNs by providing insights into how adversarial learning affects DRL algorithms and demonstrating their resilience against causative attacks when defending networks.
Created on 25 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.