A Resource Scheduling Method for Detecting Advanced Persistent Threats Based on Reinforcement Learning

An advanced persistent threat and resource scheduling technology, applied in the field of resource scheduling to detect advanced persistent threats, can solve problems such as restricting the application of reinforcement learning algorithms and decreasing the learning speed, and achieve the goal of speeding up learning, speeding up cognition, and improving data privacy performance. Effect

Active Publication Date: 2019-12-17
XIAMEN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Many current solutions do not fully consider the resource-limited scenario of the defense system, but this limitation is one of the key factors for the defense system to formulate a detection resource scheduling plan
At the same time, the learning speed of reinforcement learning algorithms such as Q-learning algorithm will drop rapidly when the state set and action set dimension are large.
These problems restrict the application of reinforcement learning algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Resource Scheduling Method for Detecting Advanced Persistent Threats Based on Reinforcement Learning
  • A Resource Scheduling Method for Detecting Advanced Persistent Threats Based on Reinforcement Learning
  • A Resource Scheduling Method for Detecting Advanced Persistent Threats Based on Reinforcement Learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present invention is further described below in conjunction with the examples, but the scope of protection is not limited to the description.

[0034] A resource scheduling method for detecting advanced persistent threats based on reinforcement learning. The specific implementation steps are as follows:

[0035] Step 1: The defense system utilizes S M =Computing resources such as 16 CPUs detect advanced persistent threats (APT) in computers or cloud storage systems, utilize Computing resources such as a CPU detect the i-th cloud storage device at time k, where 1≤i≤D, D=4. The defense system detects that the resource allocation vectors of D cloud storage devices are The optional action ranges are: The number of optional actions is |Δ D |.

[0036] Step 2: The defense system observes the number of CPU and other computing resources used by APT attacks on D cloud storage devices at the last moment As the state s of the system at the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a reinforcement learning-based resource scheduling method for detecting advanced persistent threats and belongs to the computer and information security field. As for a computer or cloud storage system, the CPU and other computing resources of the computer or cloud storage system are scheduled to detect APT (advanced persistent threat) attacks; neural episodic control learning is adopted, so that APT attack models are not required to be known in advance, and the detection resource scheduling strategy of a dynamic data storage system is optimized; on the basis of a deep convolutional neural network and episodic memory, the state space of APT detection is compressed; an episodic memory module is utilized to store resource allocation experiences; contextual environment information is fully utilized; and therefore, cognition for the new features of APT attack defense is accelerated, and learning speed is increased. The method can be applied to dynamic cloud storage environments and attack modes, improve the data privacy performance of the computer and cloud storage system under APT attacks.

Description

technical field [0001] The invention relates to computer and information security, in particular to a resource scheduling method for detecting advanced persistent threats based on reinforcement learning. Background technique [0002] With the rapid development of cloud computing technology, cloud storage technology under the background of big data has been familiar and used by more and more enterprises and individuals. While cloud storage provides us with convenience, its security has increasingly attracted our attention. The cloud storage system carries a large amount of privacy-sensitive data such as corporate files and private information. In 2016, 500 million Yahoo user accounts were leaked, and in the same year, 31 million U.S. dollars was stolen from the Central Bank of Russia. Therefore, the security and privacy of cloud storage systems have become the key factors restricting its future development. [0003] Advanced Persistent Threat (APT) refers to an attack form ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 肖亮闵明慧陈烨许冬瑾唐余亮
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products