Speeding up Planning of Cyber Attacks Using AI Techniques: State of the art

被引:0
|
作者
Grant, Tim [1 ]
机构
[1] R BAR, Benschop, Netherlands
关键词
offensive operations; automated planning; vulnerability scanning; penetration testing; red teaming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cyber warfare, launching a counter-attack should be done as fast as possible after an incoming attack, ideally cutting it short. This places severe demands on detecting the incoming attack, assessing damage, identifying the attacker, obtaining approval for a counter-attack, planning it, and preparing the resources needed. These processes take weeks or months at present, when hours or minutes are desired. Previous papers have assessed the feasibility of speeding up the digital forensics and parliamentary approval processes. This paper focuses on attack planning, assessing the state of the art in applying Artificial Intelligence (AI) techniques to automate this process. AI researchers began studying the automated generation of plans in the late 1960s. The first successful system was the Stanford Research Institute Planning System (STRIPS), developed in 1971. Since then, research into AI planning and scheduling has flourished. Milestones include the widespread use of the Planning Domain Description Language and the publication of a textbook in 2004. The technology has matured, with commercial applications in logistics, airline operations, and space exploration. The first known application to cyber operations came in 2005, when Boddy and co-workers applied AI planning techniques to generate cyber-attack plans to assess the vulnerability of information systems. The purpose of this paper is to assess the state of the art in applying AI techniques to speed up cyber-attack planning. There are five sections. After the introduction, the second section outlines the relevant literature on offensive cyber and classical AI planning. The third section focuses on adapting the military operation planning process to cyber operations. The fourth section assesses what has been achieved in applying AI techniques and what gaps remain. The fifth section draws conclusions and recommends further research.
引用
收藏
页码:235 / 244
页数:10
相关论文
共 50 条
  • [21] Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
    Stevens, Marc
    Shumow, Daniel
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 881 - 897
  • [22] State of the art techniques for nuclear emergency planning population analysis
    Steinman, RL
    2002 IEEE NUCLEAR SCIENCE SYMPOSIUM, CONFERENCE RECORD, VOLS 1-3, 2003, : 1904 - 1906
  • [23] Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
    Abri, Faranak
    Gutierrez, Luis Felipe
    Kulkarni, Chaitra T.
    Namin, Akbar Siami
    Jones, Keith S.
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1703 - 1710
  • [24] Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
    Bingjun Wan
    Chengwei Xu
    Rajendra Prasad Mahapatra
    P. Selvaraj
    Wireless Personal Communications, 2022, 127 : 1207 - 1224
  • [25] Simulation-based evacuation planning using state-of-the-art sensitivity analysis techniques
    Sfeir, Georges
    Antoniou, Constantinos
    Abbas, Nivine
    SIMULATION MODELLING PRACTICE AND THEORY, 2018, 89 : 160 - 174
  • [26] Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
    Wan, Bingjun
    Xu, Chengwei
    Mahapatra, Rajendra Prasad
    Selvaraj, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1207 - 1224
  • [27] Speeding up state-of-the-art assessments on global sustainability: introducing the Cambridge Sustainability Commissions
    Rockstroem, Johan
    GLOBAL SUSTAINABILITY, 2022, 5
  • [28] Reinforcement learning architecture for cyber-physical-social AI: state-of-the-art and perspectives
    Li, Xue
    Wang, Puming
    Jin, Xin
    Jiang, Qian
    Zhou, Wei
    Yao, Saowen
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (11) : 12655 - 12688
  • [29] Network Forensics Analysis of Cyber Attacks on Computer Systems using Machine Learning Techniques
    Yildiz, Firdevs
    Guel, Batuhan
    Ertam, Fatih
    ACTA INFOLOGICA, 2024, 8 (01): : 34 - 50
  • [30] Speeding up Tabular Reinforcement Learning Using State-Action Similarities
    Rosenfeld, Ariel
    Taylor, Matthew E.
    Kraus, Sarit
    AAMAS'17: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2017, : 1722 - 1724