Intranet User-Level Security Traffic Management with Deep Reinforcement Learning

被引:0
|
作者
Jin, Qiuqing [1 ,2 ]
Wang, Liming [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Insider threat; traffic management; user trust; reinforcement learning; INSIDER THREATS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats gradually exert great influence in cybersecurity, causing a significant loss to organizations or companies. However, whatever the form of the threat is, insiders have to conduct the unauthorized activities through the communication traffic, such as controlling the victim systems and unauthorizedly requesting the resources. Moreover, as one of the most fundamental intranet resources, bandwidth is frequently targeted by insider attackers for sabotage to traffic communication and service delivery of the network. In this paper, we present a user-level full-lifecycle security management scheme for intranet traffic from anomaly detection to mitigation execution in an online manner. This scheme dynamically monitors abnormal users that deviate from normal behavior patterns through bidirectional Gated Recurrent Unit (bi-GRU) based online unsupervised log parser, then adaptively adjusts the traffic scheduling policy according to the adequate consideration of network security, network performance and user requirements by using deep Reinforcement Learning (RL) method for online decision-making. Extensive experimental evaluations show that our scheme can stably maintain the high performance of traffic scheduling and effectively mitigate multifarious traffic threats. Our work is a valuable step towards designing self-adaptive intranets that learn to enhance security management by themselves with high scalability and deployability.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds
    Ou, Minjie
    Wang, Liming
    Xun, Hao
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Efficient User-Level Storage Disaggregation for Deep Learning
    Zhu, Yue
    Yu, Weikuan
    Jiao, Bing
    Mohror, Kathryn
    Moody, Adam
    Chowdhury, Fahim
    2019 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2019, : 34 - 45
  • [3] Learning with User-Level Privacy
    Levy, Daniel
    Sun, Ziteng
    Amin, Kareem
    Kale, Satyen
    Kulesza, Alex
    Mohri, Mehryar
    Suresh, Ananda Theertha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [4] Security and Performance in the Delegated User-level Virtualization
    Chen, Jiahao
    Li, Dingji
    Mi, Zeyu
    Liu, Yuxuan
    Zang, Binyu
    Guan, Haibing
    Chen, Haibo
    PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2023, 2023, : 227 - 245
  • [6] User-Level Runtime Security Auditing for the Cloud
    Majumdar, Suryadipta
    Madi, Taous
    Wang, Yushun
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1185 - 1199
  • [7] User-level management of kernel memory
    Haeberlen, A
    Elphinstone, K
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, 2003, 2823 : 277 - 289
  • [8] A Software Framework for User-Level Power Management
    Vilar, Bruna M. J. C.
    Gondim, Diogenes G.
    Barros, Zeus C.
    Bublitz, Frederico M.
    Almeida, Hyggo O.
    Perkusich, Angelo
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS BERLIN (ICCE-BERLIN), 2014, : 435 - 439
  • [9] Memory management for user-level network interfaces
    Welsh, M
    Basu, A
    Huang, XW
    von Eicken, T
    IEEE MICRO, 1998, 18 (02) : 77 - 82
  • [10] Traffic Models for User-Level Performance Evaluation in Data Networks
    Bonald, Thomas
    2015 27TH INTERNATIONAL TELETRAFFIC CONGRESS ITC 27, 2015, : 107 - 115