ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
ADAPTIVE HONEYPOT ENGAGEMENT
LINAN HUANG AND QUANYAN ZHU
NEW YORK UNIVERSITY
DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
IOC TO THREAT INTELLIGENCE
? Reactive defense uses Indicators of Compromise.
? Proactive defense relies on threat intelligence.
Effectiveness:
defenders acquire
more threat
information.
Stability:
attackers suffer
more pains to
adapt to the
defense
mechanism.
Difficulty:
hard to obtain via
traditional defense
techniques.
Indicator of
Compromise
Threat
Intelligence
Evidence
left
during or
after the
attack
How to
launch the
attack ?
Who are they?
What do they
want?
Organization/
Personnel
Events/Goal
TTPs
Tools
Network/Host	Artifacts
Domain	Names
IP	Address
Hash	Values
INTELLIGENCE VIA HONEYPOTS
? Use a honeynet to emulate a production system.
? Interact with rather than directly eject attackers.
? Quickly attract attackers to target honeypots and
engage them for a desired time.
? Grant attackers proper degree of freedom to avoid
the escape risk and the identi?cation risk.
Access Point
Internet / Cloud
Firewall
SwitchSwitch
Access Point
Internet / Cloud
Intrusion
Detection
Honeypot
192.168.1.10
Honeywall
Gateway
Router
Server
Honeypot
192.168.1.45
Data Base
Computer Network
Server
Work Station
192.168.1.55
Data Base
192.168.1.90
Honeywall
SensorActuator
Honeypot
Honeypot Network
HoneypotHoneypot
Honeynet Production Systems
OPTIMAL ENGAGEMENT STRATEGY
? Urgent needs to ?nd cost-effective, time-ef?cient,
and risk-averse engagement strategies that adapt to
unknown or evolving attack models.
Clients
Server
Switch
Normal Zone
Computer
Network
Emulated
Sensors
Emulated
Database
12
1110
1
2
345
67
9
8
13
Absorbing
State
? State to represent the
attacker¡¯s location at
honeypot nodes, the
normal zone, and the
absorbing state.
? Actions to engage, at-
tract, or eject attackers
ATTACKER¡¯S FOOTPRINTS
2.4899 2.4994 2.5089 2.5184 2.5279 2.5374
Time 104
1
2
3
4
5
6
7
8
9
10
11
12
13
State
? Treat the transition
kernel and the sojourn
distribution as threat
intelligence.
? Characterize the es-
cape risk and the iden-
ti?cation risk.
OPTIMAL LONG-TERM POLICY
? The long-term engagement reward u(s0
, ¦Ð) is
E
¡Þ
k=0
T k+1
T k
e?¦Ã(¦Ó+T k
)
r(Sk
, Ak
, Sk+1
, Tk
, Tk+1
, ¦Ó)d¦Ó .
? The dynamic programming representation shows
the contraction-mapping property and results in a
unique optimal policy:
v(s0
) = sup
a0¡ÊA(s0)
E[
T 1
T 0
e?¦Ã(¦Ó+T 0
)
r(s0
, a0
, S1
, T0
, T1
, ¦Ó)d¦Ó + e?¦ÃT 1
v(S1
)].
? A regulation condition avoids in?nite transitions
within a ?nite time.
T 4
State
T 3T 2T 10
1
2
3
N+2
N+1
Time
REINFORCEMENT LEARNING: FIND POLICIES THAT ADAPT TO UNKNOWN OR EVOLVING MODELS
? The exact attack model is unknown or evolving.
¨C sample the investigation reward.
¨C sample the attacker¡¯s transition probability.
¨C sample the sojourn distribution.
? Defenders learn the engagement policy based on ac-
tual honeypot interactions: update Qk+1
(sk
, ak
) as
(1 ? ¦Ák
(sk
, ak
))Qk
(sk
, ak
) + ¦Ák
(sk
, ak
)[?r1(sk
, ak
, ?sk+1
)
+ ?r2(sk
, ak
)
(1 ? e?¦Ã?¦Ók
)
¦Ã
? e?¦Ã?¦Ók
max
a ¡ÊA(?sk+1)
Qk
(?sk+1
, a )].
? Learning rate ¦Ák
(sk
, ak
) = kc
k{sk,ak}
?1+kc
guarantees
asymptotic convergence.
¨C kc ¡Ê (0, ¡Þ) is a constant parameter.
¨C k{sk,ak} ¡Ê {0, 1, ¡¤ ¡¤ ¡¤} is the number of visits to
state-action pair {sk
, ak
} up to stage k.
0 1 2 3 4 5 6 7
Step k 10
4
Value
0 100 200 300 400 500 600 700 800 900 1000
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
Variance Mean Theoretical Value
? Defenders need to choose a proper learning rate for
a quicker and better performance.
? The increase in the number of samples reduces the
variance and the error of the mean.
Challenges for Learning in Honeypot Engagement:
? Non-cooperative learning environment:
¨C In the classical RL task, the learner may choose
to start at any state at any time, and repeatedly
simulate the path from the target state.
¨C The defender can eject attackers but cannot arbi-
trarily draw them to the target honeypot.
? Risk reduction during the learning period:
¨C Defenders need to concern system safety and en-
gagement performance during real interactions.
? Asymptotic versus ?nite-step convergence:
¨C Since an attacker can terminate the interaction on
his own, the engagement time may be limited.
SECURITY METRICS TO EVALUATE ENGAGEMENT STRATEGIES
0 5 10 15 20 25
Time
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Probability
1: Swtich
2: Server
10: Database
12: Normal Zone
1: Swtich
2: Server
3
4
5
6
7
8
9
10: Database
11: Sensor
12: Normal Zone
12%
10%
1%
2%
1%
3%
3%
11%
3%
41%
4%
9%
? How attractive is the honeynet (or speci?c honey-
pot nodes) if the attacker is in the normal zone?
? How likely will the attacker in a honeypot node
visit the normal zone at a given time?
? How does the likelihood evolve?
? Attraction ef?ciency is the time to attract the at-
tacker from the normal zone to target honeypots.
? Absolutely safe engagement is the engagement time
before the attacker¡¯s ?rst escape.
? Random variable TiD is the time of the ?rst visit to
a region D ? S with initial location i ¡Ê S  D.
? Average value tm
iD = E[TiD] provides a uni?ed mea-
sure for the ef?ciency and safety of the engagement.
? Diffusion: More jumps result in a longer time.
? Asymmetry structure: the attraction time (from the
normal zone to the honeypot) is longer than the en-
gagement time (from the honeypot to the normal
zone).
0
0.2
0.4
Probability
Stationary Probability of Normal Zone
-3
-2
-1
Value
Utility of Normal Zone
0 0.5 1 1.5 2 2.5
Value of
6
8
10
Value
Expected Utility over Stationary Probability
0
0.5
1
Probability
Stationary Probability of Normal Zone
-3.5
-3
-2.5
-2
Value
Utility of Normal Zone
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Probability of Failed Attraction
0
5
10
Value
Expected Utility over Stationary Probability
? A larger ¦Ë ¡ú less persistent: it requires less time to
attract the attacker away from the normal zone.
? A smaller p ¡ú less intelligent: the attraction is less
likely to fail.
? Performances degrade only at extreme cases.
? Our policy is robust against a wide variation of the
attacker¡¯s persistence and intelligence.

More Related Content

Similar to Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes (20)

Neighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSNNeighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSN
Hitesh Mohapatra
?
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control
Intrusion Tolerance for Networked Systems through Two-Level Feedback ControlIntrusion Tolerance for Networked Systems through Two-Level Feedback Control
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control
Kim Hammar
?
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Communication Systems & Networks
?
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Linan Huang
?
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
?
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Pluribus One
?
Edge-based Discovery of Training Data for Machine Learning
Edge-based Discovery of Training Data for Machine LearningEdge-based Discovery of Training Data for Machine Learning
Edge-based Discovery of Training Data for Machine Learning
Ziqiang Feng
?
Properties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic NetworksProperties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic Networks
tiphainepn
?
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptxcryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
darkchocolate5556
?
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large SystemsCyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
ZettaScaleTechnology
?
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
aciijournal
?
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
aciijournal
?
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotation
Priyanka Aash
?
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
?
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Kiminao Kogiso
?
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
OnBoard Security, Inc. - a Qualcomm Company
?
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
GeekPwn Keen
?
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
IJMER
?
A Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap NetworkA Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap Network
Ha Phuong
?
seminar presentation
seminar presentationseminar presentation
seminar presentation
Shaantnu Anand
?
Neighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSNNeighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSN
Hitesh Mohapatra
?
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control
Intrusion Tolerance for Networked Systems through Two-Level Feedback ControlIntrusion Tolerance for Networked Systems through Two-Level Feedback Control
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control
Kim Hammar
?
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Communication Systems & Networks
?
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov De...
Linan Huang
?
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
?
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Pluribus One
?
Edge-based Discovery of Training Data for Machine Learning
Edge-based Discovery of Training Data for Machine LearningEdge-based Discovery of Training Data for Machine Learning
Edge-based Discovery of Training Data for Machine Learning
Ziqiang Feng
?
Properties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic NetworksProperties and Impact of Vicinity in Mobile Opportunistic Networks
Properties and Impact of Vicinity in Mobile Opportunistic Networks
tiphainepn
?
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptxcryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
darkchocolate5556
?
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large SystemsCyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
Cyclone DDS Unleashed: Scalability in DDS and Dealing with Large Systems
ZettaScaleTechnology
?
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
aciijournal
?
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
Cryptanalysis of Key Exchange Method Using Computational Intelligence Guided ...
aciijournal
?
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotation
Priyanka Aash
?
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
?
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Cyber-Security Enhancements of Networked Control Systems Using Homomorphic En...
Kiminao Kogiso
?
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
GeekPwn Keen
?
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
IJMER
?
A Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap NetworkA Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap Network
Ha Phuong
?

Recently uploaded (20)

FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
?
Future-Proof Your Career with AI Options
Future-Proof Your  Career with AI OptionsFuture-Proof Your  Career with AI Options
Future-Proof Your Career with AI Options
DianaGray10
?
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
?
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
?
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
?
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
?
Wondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 LatestWondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 Latest
udkg888
?
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
?
Unlock AI Creativity: Image Generation with DALL¡¤E
Unlock AI Creativity: Image Generation with DALL¡¤EUnlock AI Creativity: Image Generation with DALL¡¤E
Unlock AI Creativity: Image Generation with DALL¡¤E
Expeed Software
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
Backstage Software Templates for Java Developers
Backstage Software Templates for Java DevelopersBackstage Software Templates for Java Developers
Backstage Software Templates for Java Developers
Markus Eisele
?
FinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptxFinTech - US Annual Funding Report - 2024.pptx
FinTech - US Annual Funding Report - 2024.pptx
Tracxn
?
Future-Proof Your Career with AI Options
Future-Proof Your  Career with AI OptionsFuture-Proof Your  Career with AI Options
Future-Proof Your Career with AI Options
DianaGray10
?
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
?
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
[Webinar] Scaling Made Simple: Getting Started with No-Code Web Apps
Safe Software
?
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
L01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardnessL01 Introduction to Nanoindentation - What is hardness
L01 Introduction to Nanoindentation - What is hardness
RostislavDaniel
?
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
?
Wondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 LatestWondershare Filmora Crack 14.3.2.11147 Latest
Wondershare Filmora Crack 14.3.2.11147 Latest
udkg888
?
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
?
Unlock AI Creativity: Image Generation with DALL¡¤E
Unlock AI Creativity: Image Generation with DALL¡¤EUnlock AI Creativity: Image Generation with DALL¡¤E
Unlock AI Creativity: Image Generation with DALL¡¤E
Expeed Software
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
Backstage Software Templates for Java Developers
Backstage Software Templates for Java DevelopersBackstage Software Templates for Java Developers
Backstage Software Templates for Java Developers
Markus Eisele
?

Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes

  • 1. ADAPTIVE HONEYPOT ENGAGEMENT LINAN HUANG AND QUANYAN ZHU NEW YORK UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING IOC TO THREAT INTELLIGENCE ? Reactive defense uses Indicators of Compromise. ? Proactive defense relies on threat intelligence. Effectiveness: defenders acquire more threat information. Stability: attackers suffer more pains to adapt to the defense mechanism. Difficulty: hard to obtain via traditional defense techniques. Indicator of Compromise Threat Intelligence Evidence left during or after the attack How to launch the attack ? Who are they? What do they want? Organization/ Personnel Events/Goal TTPs Tools Network/Host Artifacts Domain Names IP Address Hash Values INTELLIGENCE VIA HONEYPOTS ? Use a honeynet to emulate a production system. ? Interact with rather than directly eject attackers. ? Quickly attract attackers to target honeypots and engage them for a desired time. ? Grant attackers proper degree of freedom to avoid the escape risk and the identi?cation risk. Access Point Internet / Cloud Firewall SwitchSwitch Access Point Internet / Cloud Intrusion Detection Honeypot 192.168.1.10 Honeywall Gateway Router Server Honeypot 192.168.1.45 Data Base Computer Network Server Work Station 192.168.1.55 Data Base 192.168.1.90 Honeywall SensorActuator Honeypot Honeypot Network HoneypotHoneypot Honeynet Production Systems OPTIMAL ENGAGEMENT STRATEGY ? Urgent needs to ?nd cost-effective, time-ef?cient, and risk-averse engagement strategies that adapt to unknown or evolving attack models. Clients Server Switch Normal Zone Computer Network Emulated Sensors Emulated Database 12 1110 1 2 345 67 9 8 13 Absorbing State ? State to represent the attacker¡¯s location at honeypot nodes, the normal zone, and the absorbing state. ? Actions to engage, at- tract, or eject attackers ATTACKER¡¯S FOOTPRINTS 2.4899 2.4994 2.5089 2.5184 2.5279 2.5374 Time 104 1 2 3 4 5 6 7 8 9 10 11 12 13 State ? Treat the transition kernel and the sojourn distribution as threat intelligence. ? Characterize the es- cape risk and the iden- ti?cation risk. OPTIMAL LONG-TERM POLICY ? The long-term engagement reward u(s0 , ¦Ð) is E ¡Þ k=0 T k+1 T k e?¦Ã(¦Ó+T k ) r(Sk , Ak , Sk+1 , Tk , Tk+1 , ¦Ó)d¦Ó . ? The dynamic programming representation shows the contraction-mapping property and results in a unique optimal policy: v(s0 ) = sup a0¡ÊA(s0) E[ T 1 T 0 e?¦Ã(¦Ó+T 0 ) r(s0 , a0 , S1 , T0 , T1 , ¦Ó)d¦Ó + e?¦ÃT 1 v(S1 )]. ? A regulation condition avoids in?nite transitions within a ?nite time. T 4 State T 3T 2T 10 1 2 3 N+2 N+1 Time REINFORCEMENT LEARNING: FIND POLICIES THAT ADAPT TO UNKNOWN OR EVOLVING MODELS ? The exact attack model is unknown or evolving. ¨C sample the investigation reward. ¨C sample the attacker¡¯s transition probability. ¨C sample the sojourn distribution. ? Defenders learn the engagement policy based on ac- tual honeypot interactions: update Qk+1 (sk , ak ) as (1 ? ¦Ák (sk , ak ))Qk (sk , ak ) + ¦Ák (sk , ak )[?r1(sk , ak , ?sk+1 ) + ?r2(sk , ak ) (1 ? e?¦Ã?¦Ók ) ¦Ã ? e?¦Ã?¦Ók max a ¡ÊA(?sk+1) Qk (?sk+1 , a )]. ? Learning rate ¦Ák (sk , ak ) = kc k{sk,ak} ?1+kc guarantees asymptotic convergence. ¨C kc ¡Ê (0, ¡Þ) is a constant parameter. ¨C k{sk,ak} ¡Ê {0, 1, ¡¤ ¡¤ ¡¤} is the number of visits to state-action pair {sk , ak } up to stage k. 0 1 2 3 4 5 6 7 Step k 10 4 Value 0 100 200 300 400 500 600 700 800 900 1000 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 Variance Mean Theoretical Value ? Defenders need to choose a proper learning rate for a quicker and better performance. ? The increase in the number of samples reduces the variance and the error of the mean. Challenges for Learning in Honeypot Engagement: ? Non-cooperative learning environment: ¨C In the classical RL task, the learner may choose to start at any state at any time, and repeatedly simulate the path from the target state. ¨C The defender can eject attackers but cannot arbi- trarily draw them to the target honeypot. ? Risk reduction during the learning period: ¨C Defenders need to concern system safety and en- gagement performance during real interactions. ? Asymptotic versus ?nite-step convergence: ¨C Since an attacker can terminate the interaction on his own, the engagement time may be limited. SECURITY METRICS TO EVALUATE ENGAGEMENT STRATEGIES 0 5 10 15 20 25 Time 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Probability 1: Swtich 2: Server 10: Database 12: Normal Zone 1: Swtich 2: Server 3 4 5 6 7 8 9 10: Database 11: Sensor 12: Normal Zone 12% 10% 1% 2% 1% 3% 3% 11% 3% 41% 4% 9% ? How attractive is the honeynet (or speci?c honey- pot nodes) if the attacker is in the normal zone? ? How likely will the attacker in a honeypot node visit the normal zone at a given time? ? How does the likelihood evolve? ? Attraction ef?ciency is the time to attract the at- tacker from the normal zone to target honeypots. ? Absolutely safe engagement is the engagement time before the attacker¡¯s ?rst escape. ? Random variable TiD is the time of the ?rst visit to a region D ? S with initial location i ¡Ê S D. ? Average value tm iD = E[TiD] provides a uni?ed mea- sure for the ef?ciency and safety of the engagement. ? Diffusion: More jumps result in a longer time. ? Asymmetry structure: the attraction time (from the normal zone to the honeypot) is longer than the en- gagement time (from the honeypot to the normal zone). 0 0.2 0.4 Probability Stationary Probability of Normal Zone -3 -2 -1 Value Utility of Normal Zone 0 0.5 1 1.5 2 2.5 Value of 6 8 10 Value Expected Utility over Stationary Probability 0 0.5 1 Probability Stationary Probability of Normal Zone -3.5 -3 -2.5 -2 Value Utility of Normal Zone 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Probability of Failed Attraction 0 5 10 Value Expected Utility over Stationary Probability ? A larger ¦Ë ¡ú less persistent: it requires less time to attract the attacker away from the normal zone. ? A smaller p ¡ú less intelligent: the attraction is less likely to fail. ? Performances degrade only at extreme cases. ? Our policy is robust against a wide variation of the attacker¡¯s persistence and intelligence.