an artificial coevolutionary framework for adversarial ai...them appear to be high value targets....

29
An Artificial Coevolutionary Framework for Adversarial AI Jamal Toutouh [email protected]

Upload: others

Post on 24-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

An Artificial Coevolutionary

Framework for Adversarial AI

Jamal Toutouh

[email protected]

Page 2: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

ALFAhttp://groups.csail.mit.edu/ALFA

[email protected]

Page 3: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

ALFA Group 2018-2019

Erik Hemberg Nicole Hoffman Abdullah Al-DujailiUna-May O’Reilly

Shashank Srikant

Jamal Toutouh

Andrew Zhang Linda Zhang

Michal

Shlapentokh-RothmanMilka Piszczek

UR

OP

Saeyoung Rho (TPP)

Gra

d

Jonathan Kelly Ayesha BajwaLi Wang

ME

ng

Edilberto Amorim Jonathan Rubin Re

se

arc

h A

ss

oc

.

Co

re M

em

be

rsP

hD

Miguel Paredes

Page 4: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Agenda

• Adversarial Engagements and Arms Races

• Network Security Arms Races

– RIVALS framework

» RIVALS: Robustness vs Denial

» AVAIL: Isolation vs Contagion

» DARK Horse and ADHD: Deception vs reconnaissance

» Acknowledgments:

▪ Funding

❖ Member companies supporting Cybersecurity@CSAIL

❖ DARPA XD3

❖ MIT Lincoln Labs

▪ Work

❖ Members of the ALFA group and collaborators

Page 5: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

LEARNING

LEARNING

Page 6: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

RIVALS

RIVALS helps the defense anticipate the attack strategies given a

defensive configuration (and mission)

RIVALS helps the defense consider arms races and

Design effective courses of action for the network to be resilient

ENGAGEMENT

ENVIRONMENT

Page 7: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Advanced Persistent Threat Kill Chain

http://drshem.com/wp-content/uploads/2016/01/APT-Life-Cycle-Expanded.png from INTEL Security

Page 8: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Deceptive Defense With Honeypots

Flow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Flow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’sgoals are to evade detection while scanning over

as much of the network as possible and discovering the real

Achleitner et al.

Page 9: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Engagement

CONFLICTING OBJECTIVES

MEASUREMENTSd: time for defense to detect a scan (sec.)t: time to run the scan (sec.) n: number of scan detections by defender h/H: ratio of real nodes that were discovered to total real nodes.

Evaluate using Mininet

Flow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Page 10: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Adversarial Behaviors

APT

SCANNING

TACTICS

SDN

DECEPTION

SYSTEM

PARMSFlow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Page 11: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Defensive Learning

APT

SCANNING

TACTICS

SDN

DECEPTION

SYSTEM

PARMSFlow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Page 12: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Static Attack – Optimized DefenseHypothesis: Good defense has more honeypots, subnets and real hosts with even distribution

Results:

- More difficult to detect smaller NMAP batch sizes

- Fitness function rewards discovering more real host less than the penalty of being detected: smaller scans do

better

- Defense against an attacker that scans with local preference is the most difficult

- Expected real behavior of attackers is to start scan their local subnet

Possible recommendation: create subnets for DHCP leases where real hosts are in a different subnet

Page 13: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Attack Learning

RIVALS

APT

SCANNING

TACTICS

SDN

DECEPTION

SYSTEM

PARMSFlow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Page 14: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Static Defense – Optimized AttackResults:

- Difficult to attack many honeypots and subnets.

- Easier with crowded distribution of real hosts, large reward when that subnet is scanned (similar for defender when avoiding)

Points to adopting high risk- and high reward tactic

Page 15: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Coevolutionary Arms Race

RIVALS

APT

SCANNING

TACTICS

SDN

DECEPTION

SYSTEM

PARMS

Flow Rule

Generator

Analyze

Flow

Statistics

Configures

Deceptive Virtual

Network

Manipulate

Virtual Network

Traffic

Simulate Virtual

Network

Resources

SDN Controller Network view

generator

Deception Server

DeceptionSDN

Fitness Function

Time to detect first scan

Number of scans detected

Number of real nodes detected

Coevolutionary Algorithm

Attacker configurations

Defender configurations

Fitness

score

DarkHorse

Fig. 1: Overview of SDN system with deception, named Decept i veSDN, and Dar kHor se. The two systems recreate the

evolving competition between scans and deceptive views.

2) We analyze the optimized configurations for both defend-

ers and attackers in a deceptive network subject to static

adversaries or when coevolving.

3) Our experiments show that depending on whether the

defender or the attacker is adapting, but the adversary

is static, crowding real nodes onto one subnet will either

be the optimized configuration, or the worst configuration

respectively.

4) Our experiments with coevolving adversaries indicate

sensitivity to the rates of evolution. When the attacker

evolves more (i.e. defender is static temporarily), the

attacker’s optimized scanning batch sizes are small while

the defender’s best response is to distribute real nodes

randomly. Conversely, when the defender evolves more

(i.e. attacker is static temporarily), the attacker’s opti-

mized scanning batch size is 20 times larger while the

defender’s best response is to distribute real nodes evenly,

rather than randomly.

Achleitner’s deception system [1], called by us

Decept i veSDN, is described in Section II. Our threat

model and AI system, named Dar kHor se, are described in

Section III. We analyze the experimental results in Section IV.

Finally, Section V summarizes the results and future work.

I I . BACKGROUND

Two examples of research on deception are [5] and [1].

Passive deception works by deploying static decoy systems

such as honeypots [8], [16], [12]. On a network, honeypots

appear real to other nodes on the network, but do not exist in

the underlying network. They do not contain any live data or

information, but they can contain false information that makes

them appear to be high value targets. They can be configured

to prevent the intruder from accessing network enclaves and to

gather information and signal unauthorized use, see Figure 2.

3

5

4

2

1 1

32

5

4

Fig. 2: Example of a virtual network view showing the place-

ment of nodes and honeypots in order to delay adversaries

from identifying real nodes

Achleitner’s deception system [1], which we call

Decept i veSDN, defends against network reconnaissance

by simulating virtual network topologies and using passive

deception. It relies upon SDN flow tables and the SDN

separation of controller and switch. These support agile

distribution of virtual, imposter networks that overlay the true

one. Each time any node on the network requests a DHCP

lease, it internally is assigned a unique deceptive network

view. A network view generator sets up these deceptive views

so that the overall address space appears falsely large. It

places real nodes on virtual subnets to increase the time it

takes a scanner to find them and inserts honeypots which it

can monitor for illicit activity. Using the dynamic address

translation provided by the deception server, only one real

node is used, but is simulated to appear as many nodes

dispersed throughout the network. To ensure accurate routing,

a server handles dynamic address translation between the

overlay network, and true network addresses by rewriting the

headers in “ real time”. Packets are transferred to it through

flow table logic. Virtual routers simulate virtual paths so

that the scan attack cannot infer the actual topology. [1]

demonstrates the system against a variety of scan attacks.

As we will detail in the next section, the defensive net-

work views and scanning attacks of Decept i veSDN com-

prise strategic, parametrically configurable, multi-dimensional

spaces. Decept i veSDN serves as an example of a sys-

tem where it is unknown how to optimally set up an at-

tack or defense configuration – a situation that depends

on the adversary. (Note that from now on we refer to

the virtual network unless explicitly stated). Dar kHor se

utilizes Decept i veSDN as an experimental platform.

Decept i veSDN allows Dar kHor se to measure the out-

come of an “adversarial engagement” between an attack and

a defense, each specified by some set of configuration values.

Outcome informs the GA about relatively better configura-

tions, given the adversaries’ conflicting objectives. We next

succinctly describe our threat model and Dar kHor se.

I I I . METHOD

Threat Model: Dar kHor se assumes that a node on a network

has been compromised, and from it there is an attacker

scanning the SDN in an attempt to identify vulnerable nodes.

The attacker’s goals are to evade detection while scanning over

as much of the network as possible and discovering the real

Page 16: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Coevolution of Scanning and DeceptionF

itn

ess

Best Fitness Lockstep CoevolutionA0 A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 A11 A12 A13 A14 A15 A16 A17 A18 A19

D0 D1 D2 D3 D4

Defender does significantly worse vs an evolving attacker, thus beware of static assumptions

Page 17: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Evolved for defense & attack

Page 18: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

From Biological Coevolution Towards

Adversarial AI Via Artificial Coevolution

Wikimedia Commons: Cuttlefish changing color. URL https://upload.wikimedia.

org/wikipedia/commons/thumb/1/1c/Cuttlefish_color.jpg/636px- Cuttlefish_

color.jpg. Picture taken by Nick Hobgood - License: CC BY-SA 3.0

Wikimedia Commons: Misumena vatia with wasp (1998). URL https://en. wikipedia.org/wiki/File:Misumena.vatia.beute.wespe.1771.jpg#filelinks. Pic-

ture taken by Olaf Leillinger - License: CC-BY-SA-2.0/DE and GNU FDL

Wikimedia Commons: Viceroy butterfly (2005). URL https://commons.wikimedia. org/wiki/File:Viceroy_Butterfly.jpg. License: CC BY-SA 3.0. Subject to dis-

claimers.

Wikimedia Commons: Monarch in may (2007). URL https://en.wikipedia.org/

wiki/Monarch_butterfly#/media/File:Monarch_In_May.jpg. Created: 29 May 2007

By Kenneth Dwain Harrelson - License: CC BY-SA 3.0

• Biological arms races can provide adaptation

• Can coevolution help to improve robustness in other adversarial settings?

• Multiple comparisons can aid robustness and improve diversity

• Help to anticipate

• Replay the arms-race

Page 19: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Use Case

RIVALS

Dark

Horse

AVAIL

Engagement

Environment

Evaluation

Objective

- MinMax

- Mean Utility

- Pareto

Attacker Behavior

Parameters

Objectives

Threat

Environment

Attacker Population

Defender Population

Defender Behavior

Parameters

Fitness Evaluation

Measurements

Adversarial AI Framework Concept

CompendiumCache

Learning Variants

- Coevolution

- Non-negative

matrix

factorization

- Gaussian

processes

- Ensembles

Page 20: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

DDoS Network Defense

https://proxy.duckduckgo.com/iu/?u=https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1*8gG2DMHmnGJBIyDtR79rjA.png&f=1

Page 21: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

RIVALS: Network Routing Problem

DEFENDER ACTIONS

link flooding

shortest path

CHORD

FITNESS

mission disruption

attacks in number and duration

Defender Objective: maximize

Attacker Objective: maximize

ATTACKER ACTIONS

node, start time, end time

complete loss of node

FITNESS

mission completion

time and hops

STRATEGY ADAPTATION

&

COEVOLUTION

OF

DDOS DEFENSE & ATTACKS

PEER TO PEER OVERLAY

NETWORK

TESTBED

DOS Attack Campaign

Defense Strategy

Mission Progress

Network Metrics

Page 22: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

ALFA Sim of P2P

Fig. 9: Results from a Coev run for network rout ing on logical topology on

network topology 0. Top: Median and best fitness results for at tacker populat ion

over 20 generat ions. Bot tom: Median and best fitness results for defender

populat ion over 20 generat ions.

23

Defender finds an optimal solution

Page 23: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Network Segmentation

The Definitive Guide to Micro-Segmentation, John Friedman, CyberEdge Group

Page 24: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

AVAIL: Enclaves vs Contagion

DEFENDER ACTIONS

set tap sensitivity and size

for each enclave

FITNESS

mission delay

budget remaining

OBJECTIVE: minmax

ATTACKER ACTIONS

set strength and duration of attack

for each enclave

FITNESS

mission delay

budget remaining

STRATEGY ADAPTATION

&

COEVOLUTION

OF

DEFENSE & ATTACKS

CONTAGION &

DETECTION

SIMULATOR

Attack: strength, duration

Defense: per enclave, #devices, tap sensitivity

Mission delay

Budget use

Realistic parameters from a

validated low level emulator

Page 25: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Evolve Defense

Defender learns sound network segmentation practices over generations

Page 26: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

RIVALS

Dark

Horse

AVAIL

Engagement

Environment

Evaluation

Objective

Attacker Behavior

Parameters

Objectives

Threat

Environment

Attacker Population

Defender Population

Defender Behavior

Parameters

Fitness Evaluation

Measurements

Compendium Analysis

Cache

SUBSET

SELECTION

Then

ALL VS ALL

ENGAGEMENTS

WITHIN SIDE

COMPARISON

COMPENDIUM SOLUTIONS

SELECTION

VISUALIZATIONS

Use Case

Page 27: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Attack Campaign Performance Comparison

Different metrics and Ranking Schemes

Page 28: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Attack Campaign Similarity

Page 29: An Artificial Coevolutionary Framework for Adversarial AI...them appear to be high value targets. They can be FRQ¿JXUHG to prevent the intruder from accessing network enclaves and

Summary & Future Work

• Adversarial Engagements and Arms Races

• Network Security Arms Races

– RIVALS Adversarial AI framework

» RIVALS: Robustness vs Denial

» AVAIL: Isolation vs Contagion

» DARK Horse and ADHD: Deception vs reconnaissance

• Future

– Validate, refine, and extend use cases