cyberbattlesim
Adversarial Agents For Attacking Inaudible Voice Activated Devices
The paper applies reinforcement learning to novel Internet of Thing configurations. Our analysis of inaudible attacks on voice-activated devices confirms the alarming risk factor of 7.6 out of 10, underlining significant security vulnerabilities scored independently by NIST National Vulnerability Database (NVD). Our baseline network model showcases a scenario in which an attacker uses inaudible voice commands to gain unauthorized access to confidential information on a secured laptop. We simulated many attack scenarios on this baseline network model, revealing the potential for mass exploitation of interconnected devices to discover and own privileged information through physical access without adding new hardware or amplifying device skills. Using Microsoft's CyberBattleSim framework, we evaluated six reinforcement learning algorithms and found that Deep-Q learning with exploitation proved optimal, leading to rapid ownership of all nodes in fewer steps. Our findings underscore the critical need for understanding non-conventional networks and new cybersecurity measures in an ever-expanding digital landscape, particularly those characterized by mobile devices, voice activation, and non-linear microphones susceptible to malicious actors operating stealth attacks in the near-ultrasound or inaudible ranges. By 2024, this new attack surface might encompass more digital voice assistants than people on the planet yet offer fewer remedies than conventional patching or firmware fixes since the inaudible attacks arise inherently from the microphone design and digital signal processing. Voice-activated devices, such as digital voice assistants, have experienced rapid proliferation in recent years.
- Asia > Singapore (0.05)
- Asia > Thailand > Pattani > Pattani (0.04)
- North America > United States > Massachusetts (0.04)
- North America > United States > Alabama > Madison County > Huntsville (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
A Multiagent CyberBattleSim for RL Cyber Operation Agents
Kunz, Thomas, Fisher, Christian, La Novara-Gsell, James, Nguyen, Christopher, Li, Li
Hardening cyber physical assets is both crucial and labor-intensive. Recently, Machine Learning (ML) in general and Reinforcement Learning RL) more specifically has shown great promise to automate tasks that otherwise would require significant human insight/intelligence. The development of autonomous RL agents requires a suitable training environment that allows us to quickly evaluate various alternatives, in particular how to arrange training scenarios that pit attackers and defenders against each other. CyberBattleSim is a training environment that supports the training of red agents, i.e., attackers. We added the capability to train blue agents, i.e., defenders. The paper describes our changes and reports on the results we obtained when training blue agents, either in isolation or jointly with red agents. Our results show that training a blue agent does lead to stronger defenses against attacks. In particular, training a blue agent jointly with a red agent increases the blue agent's capability to thwart sophisticated red agents.
- North America > Canada > Ontario > National Capital Region > Ottawa (0.28)
- North America > United States > New York > New York County > New York City (0.04)
- Europe > Ukraine (0.04)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.46)
Incorporating Deception into CyberBattleSim for Autonomous Defense
Walter, Erich, Ferguson-Walter, Kimberly, Ridley, Ahmad
Cyber deception considers the human aspects of an attacker in order to impede cyber attacks and improve Deceptive elements, including honeypots and decoys, security [17], which can also translate to advantages against were incorporated into the Microsoft CyberBattleSim automated attackers. Cyber deception aims to understand and experimentation and research platform influence an attacker even after they have already infiltrated [30]. The defensive capabilities of the deceptive a network, and ultimately to delay, deter, and disrupt their elements were tested using reinforcement attack. While some ML methods for detection in cybersecurity learning based attackers in the provided capture are still working on improving true-positive/false-positive the flag environment. The attacker's progress was rates, cyber deception technologies can often naturally act found to be dependent on the number and location as a high-confidence early warning mechanism.
- North America > United States > Hawaii (0.04)
- North America > United States > New York (0.04)
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- Europe > Austria (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.70)
Microsoft open-sources tool to use AI in simulated attacks
The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. As part of Microsoft's research into ways to use machine learning and AI to improve security defenses, the company has released an open source attack toolkit to let researchers create simulated network environments and see how they fare against attacks. Microsoft 365 Defender Research released CyberBattleSim, which creates a network simulation and models how threat actors can move laterally through the network looking for weak points. When building the attack simulation, enterprise defenders and researchers create various nodes on the network and indicate which services are running, which vulnerabilities are present, and what type of security controls are in place. Automated agents, representing threat actors, are deployed in the attack simulation to randomly execute actions as they try to take over the nodes. "The simulated attacker's goal is to take ownership of some portion of the network by exploiting these planted vulnerabilities.