Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems

D Goel, A Neumann, F Neumann, H Nguyen… - Proceedings of the …, 2023 - dl.acm.org
We study a Stackelberg game between one attacker and one defender in a configurable
environment. The defender picks a specific environment configuration. The attacker …

Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

D Goel - arXiv preprint arXiv:2310.10667, 2023 - arxiv.org
With the burgeoning advancements of computing and network communication technologies,
network infrastructures and their application environments have become increasingly …

A Generic Approach for Network Defense Strategies Generation Based on Evolutionary Game Theory

L Liu, C Tang, L Zhang, S Liao - Information Sciences, 2024 - Elsevier
The generation of optimal defense strategies in dynamic adversarial environments is crucial
for cybersecurity. Recently, defense approaches based on evolutionary game theory have …

Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs

HQ Ngo, M Guo, H Nguyen - arXiv preprint arXiv:2312.16820, 2023 - arxiv.org
We study a Stackelberg game between an attacker and a defender on large Active Directory
(AD) attack graphs where the defender employs a set of honeypots to stop the attacker from …

Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

D Goel, K Moore, M Guo, D Wang, M Kim… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature:
the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It …

Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys

HQ Ngo, M Guo, H Nguyen - arXiv preprint arXiv:2403.18162, 2024 - arxiv.org
Microsoft Active Directory (AD) is the default security management system for Window
domain network. We study the problem of placing decoys in AD network to detect potential …