no code implementations • 2 Apr 2024 • Kim Hammar, Rolf Stadler
We formulate intrusion tolerance for a system with service replicas as a two-level optimal control problem.
no code implementations • 29 Feb 2024 • Tao Li, Kim Hammar, Rolf Stadler, Quanyan Zhu
To address these limitations, we propose conjectural online learning (\textsc{col}), an online method for generic \textsc{aisg}s. \textsc{col} uses a forecaster-actor-critic (\textsc{fac}) architecture where subjective forecasts are used to conjecture the opponents' strategies within a lookahead horizon, and Bayesian learning is used to calibrate the conjectures.
no code implementations • 20 Feb 2024 • Xiaoxuan Wang, Rolf Stadler
We study automated intrusion detection in an IT infrastructure, specifically the problem of identifying the start of an attack, the type of attack, and the sequence of actions an attacker takes, based on continuous measurements from the infrastructure.
1 code implementation • 19 Feb 2024 • Kim Hammar, Tao Li, Rolf Stadler, Quanyan Zhu
We study automated security response for an IT infrastructure and formulate the interaction between an attacker and a defender as a partially observed, non-stationary game.
1 code implementation • 6 Sep 2023 • Kim Hammar, Rolf Stadler
We study automated intrusion response for an IT infrastructure and formulate the interaction between an attacker and a defender as a partially observed stochastic game.
no code implementations • 25 Jun 2023 • Forough Shahab Samani, Rolf Stadler
By first learning the system model and the operating region from testbed traces, we can train the agent for different management objectives in parallel.
1 code implementation • 11 Jan 2023 • Kim Hammar, Rolf Stadler
We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve through reinforcement learning and self-play.
no code implementations • 8 Oct 2022 • Forough Shahab Samani, Rolf Stadler
We present a framework that lets a service provider achieve end-to-end management objectives under varying load.
1 code implementation • 29 May 2022 • Kim Hammar, Rolf Stadler
We study automated intrusion prevention using reinforcement learning.
1 code implementation • 3 Apr 2022 • Kim Hammar, Rolf Stadler
We present a system for interactive examination of learned security policies.
no code implementations • 15 Dec 2021 • Xiaoxuan Wang, Rolf Stadler
We present an online algorithm called Online Stable Feature Set Algorithm (OSFS), which selects a small feature set from a large number of available data sources after receiving a small number of measurements.
2 code implementations • 30 Oct 2021 • Kim Hammar, Rolf Stadler
We therefore develop a reinforcement learning approach to approximate an optimal threshold policy.
1 code implementation • 14 Jun 2021 • Kim Hammar, Rolf Stadler
We study automated intrusion prevention using reinforcement learning.
no code implementations • 28 Oct 2020 • Xiaoxuan Wang, Forough Shahab Samani, Rolf Stadler
Data-driven functions for operation and management often require measurements collected through monitoring for model training and prediction.
1 code implementation • 17 Sep 2020 • Kim Hammar, Rolf Stadler
We present a method to automatically find security strategies for the use case of intrusion prevention.
no code implementations • 4 Sep 2015 • Jawwad Ahmed, Andreas Johnsson, Rerngvit Yanggratoke, John Ardelius, Christofer Flinta, Rolf Stadler
Detecting faults and SLA violations in a timely manner is critical for telecom providers, in order to avoid loss in business, revenue and reputation.