Adaptive Security Response Strategies Through Conjectural Online Learning

Kim Hammar*, Tao Li, Rolf Stadler, Quanyan Zhu

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

3 Citations (Scopus)

Abstract

We study the problem of learning adaptive security response strategies for an IT infrastructure. We formulate the interaction between an attacker and a defender as a partially observed, non-stationary game. We relax the standard assumption that the game model is correctly specified and consider that each player has a probabilistic conjecture about the model, which may be misspecified in the sense that the true model has probability 0. This formulation allows us to capture uncertainty and misconception about the infrastructure and the intents of the players. To learn effective game strategies online, we design Conjectural Online Learning (COL), a novel method where a player iteratively adapts its conjecture using Bayesian learning and updates its strategy through rollout. We prove that the conjectures converge to best fits, and we provide a bound on the performance improvement that rollout enables with a conjectured model. To characterize the steady state of the game, we propose a variant of the Berk-Nash equilibrium. We present COL through an intrusion response use case. Testbed evaluations show that COL produces effective security strategies that adapt to a changing environment. We also find that COL enables faster convergence than current reinforcement learning techniques.
© 2025 The Authors.
Original languageEnglish
Pages (from-to)4055-4070
Number of pages16
JournalIEEE Transactions on Information Forensics and Security
Volume20
Online published8 Apr 2025
DOIs
Publication statusPublished - 2025
Externally publishedYes

Funding

This work was supported in part by the Defense Advanced Research Project Agency (DARPA) through the CASTLE Program under Contract W912CG23C0029; and in part by the Wallenberg Artificial Intelligence (AI), Autonomous Systems and Software Program (WASP), funded by the Knut and Alice Wallenberg Foundation.

Research Keywords

  • Cybersecurity
  • network security
  • game theory
  • Berk-Nash equilibrium
  • Bayesian learning
  • rollout

Publisher's Copyright Statement

  • This full text is made available under CC-BY 4.0. https://creativecommons.org/licenses/by/4.0/

Fingerprint

Dive into the research topics of 'Adaptive Security Response Strategies Through Conjectural Online Learning'. Together they form a unique fingerprint.

Cite this