Reinforcement learning-based resource scheduling method for detecting advanced persistent threats

An advanced persistent threat and resource scheduling technology, which is applied in the field of resource scheduling for detecting advanced persistent threats, can solve the problems of learning speed reduction, restricting the application of reinforcement learning algorithms, etc., and achieve the goal of accelerating cognition, speeding up learning speed, and improving data privacy performance Effect

Active Publication Date: 2017-10-20
XIAMEN UNIV
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Many current solutions do not fully consider the resource-limited scenario of the defense system, but this limitation is one of the key factors for the defense system to formulate a detection resource scheduling plan
At the same ti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcement learning-based resource scheduling method for detecting advanced persistent threats
  • Reinforcement learning-based resource scheduling method for detecting advanced persistent threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present invention is further described below in conjunction with the examples, but the scope of protection is not limited to the description.

[0034] A resource scheduling method for detecting advanced persistent threats based on reinforcement learning. The specific implementation steps are as follows:

[0035] Step 1: The defense system utilizes S M =Computing resources such as 16 CPUs detect advanced persistent threats (APT) in computers or cloud storage systems, utilize Computing resources such as a CPU detect the i-th cloud storage device at time k, where 1≤i≤D, D=4. The defense system detects that the resource allocation vectors of D cloud storage devices are The optional action ranges are: The number of optional actions is |Δ D |.

[0036] Step 2: The defense system observes the number of CPU and other computing resources used by APT attacks on D cloud storage devices at the last moment As the state s of the system at the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a reinforcement learning-based resource scheduling method for detecting advanced persistent threats and belongs to the computer and information security field. As for a computer or cloud storage system, the CPU and other computing resources of the computer or cloud storage system are scheduled to detect APT (advanced persistent threat) attacks; neural episodic control learning is adopted, so that APT attack models are not required to be known in advance, and the detection resource scheduling strategy of a dynamic data storage system is optimized; on the basis of a deep convolutional neural network and episodic memory, the state space of APT detection is compressed; an episodic memory module is utilized to store resource allocation experiences; contextual environment information is fully utilized; and therefore, cognition for the new features of APT attack defense is accelerated, and learning speed is increased. The method can be applied to dynamic cloud storage environments and attack modes, improve the data privacy performance of the computer and cloud storage system under APT attacks.

Description

technical field [0001] The invention relates to computer and information security, in particular to a resource scheduling method for detecting advanced persistent threats based on reinforcement learning. Background technique [0002] With the rapid development of cloud computing technology, cloud storage technology under the background of big data has been familiar and used by more and more enterprises and individuals. While cloud storage provides us with convenience, its security has increasingly attracted our attention. The cloud storage system carries a large amount of privacy-sensitive data such as corporate files and private information. In 2016, 500 million Yahoo user accounts were leaked, and in the same year, 31 million U.S. dollars was stolen from the Central Bank of Russia. Therefore, the security and privacy of cloud storage systems have become the key factors restricting its future development. [0003] Advanced Persistent Threat (APT) refers to an attack form ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 肖亮闵明慧陈烨许冬瑾唐余亮
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products