Seminar: Deep Learning for Network Attack and Defense
- Date
- February 03, 2023
- Time
- 12:00 PM EST - 1:30 PM EST
- Location
- KHE 225
- Open To
- Students, Faculty, Adjunct Faculty, Staff and Post-Doctoral Fellows
Student: Jordan Lanctot
Supervisor: Dr. Sean Cornelius
Abstract
Jordan Lanctot ˆ 1, Sean P. Cornelius1,2,†
1 Department of Physics, Toronto Metropolitan University, Toronto, ON M5B 2K3, Canada
2 Center for Complex Network Research, Northeastern University, Boston, MA 02115, USA
† To whom correspondence should be addressed
Networked systems are vulnerable to attacks that remove one or a few key nodes, causing the connectivity to collapse. Through the use of Neural Network (NN) embedding frameworks,1 Deep Leaning (DL) can be used to discover vulnerable nodes that will cause network failure.2 This capacity to discover key features of networks of varying sizes and degrees, brings into question the security and robustness of infrastructure and networked systems. Can the vulnerabilities of real networks be obfuscated through partial network concealment strategies, allowing for a defensive response?
Here, we explore the ability of deep reinforcement learning to either: from a concealed graph to efficiently dismantle the network (network attack), or to thwart such an attacker by concealing a a subset of the network’s links (network defense). We explore not only the capacity of these agents to learn against fixed heuristics, but also against each other. We show that for all of the heuristic approaches explored, agents are able to attack, or defend, a given network efficiently. When the two DL agents are pitted against one another, we find, surprisingly, the defender has a natural advantage. This advantage results in tandem strategies which favour the defender over the span of many possible network configurations.
References
1. Dai, H., Khalil, E. B., Zhang, Y., Dilkina, B. & Song, L. Learning combinatorial optimation algorithms over graphs. In Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS’17, 6351–6361 (Curran Associates Inc.).
2. Fan, C., Zeng, L., Sun, Y. & Liu, Y.-Y. Finding key players in complex networks through deep reinforcement learning. Nature Machine Intelligence 2, 317–324 (2020). URL https: //doi.org/10.1038/s42256-020-0177-2.