Learning About the Adversary

Book Chapter (2023)
Author(s)

A. Nadeem (TU Delft - Cyber Security)

Sicco Verwer (TU Delft - Cyber Security)

Shanchieh Jay Yang (Rochester Institute of Technology)

Research Group
Cyber Security
Copyright
© 2023 A. Nadeem, S.E. Verwer, Shanchieh Jay Yang
DOI related publication
https://doi.org//10.1007/978-3-031-29269-9_6
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 A. Nadeem, S.E. Verwer, Shanchieh Jay Yang
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Volume number
87
Pages (from-to)
105-132
ISBN (print)
978-3-031-29268-2
ISBN (electronic)
978-3-031-29271-2
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter, we explore what can be learnt about cyber adversaries from observable data, such as intrusion alerts, network traffic, and threat intelligence feeds. We describe the challenges of building autonomous cyber defense agents, such as learning from noisy observables with no ground truth, and the brittle nature of deep learning based agents that can be easily evaded by adversaries. We illustrate three state-of-the-art autonomous cyber defense agents that model adversary behavior from traffic induced observables without a priori expert knowledge or ground truth labels. We close with recommendations and directions for future work.

Files

978_3_031_29269_9_6.pdf
(pdf | 1.37 Mb)
- Embargo expired in 04-12-2023
License info not available