Search Results for author: Rolf Stadler

Found 16 papers, 8 papers with code

Intrusion Tolerance for Networked Systems through Two-Level Feedback Control

no code implementations2 Apr 2024 Kim Hammar, Rolf Stadler

We formulate intrusion tolerance for a system with service replicas as a two-level optimal control problem.

Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games

no code implementations29 Feb 2024 Tao Li, Kim Hammar, Rolf Stadler, Quanyan Zhu

To address these limitations, we propose conjectural online learning (\textsc{col}), an online method for generic \textsc{aisg}s. \textsc{col} uses a forecaster-actor-critic (\textsc{fac}) architecture where subjective forecasts are used to conjecture the opponents' strategies within a lookahead horizon, and Bayesian learning is used to calibrate the conjectures.

Decision Making

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

no code implementations20 Feb 2024 Xiaoxuan Wang, Rolf Stadler

We study automated intrusion detection in an IT infrastructure, specifically the problem of identifying the start of an attack, the type of attack, and the sequence of actions an attacker takes, based on continuous measurements from the infrastructure.

Intrusion Detection

Automated Security Response through Online Learning with Adaptive Conjectures

1 code implementation19 Feb 2024 Kim Hammar, Tao Li, Rolf Stadler, Quanyan Zhu

We study automated security response for an IT infrastructure and formulate the interaction between an attacker and a defender as a partially observed, non-stationary game.

Scalable Learning of Intrusion Responses through Recursive Decomposition

1 code implementation6 Sep 2023 Kim Hammar, Rolf Stadler

We study automated intrusion response for an IT infrastructure and formulate the interaction between an attacker and a defender as a partially observed stochastic game.

A Framework for dynamically meeting performance objectives on a service mesh

no code implementations25 Jun 2023 Forough Shahab Samani, Rolf Stadler

By first learning the system model and the operating region from testbed traces, we can train the agent for different management objectives in parallel.

Management Reinforcement Learning (RL)

Learning Near-Optimal Intrusion Responses Against Dynamic Attackers

1 code implementation11 Jan 2023 Kim Hammar, Rolf Stadler

We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve through reinforcement learning and self-play.

Dynamically meeting performance objectives for multiple services on a service mesh

no code implementations8 Oct 2022 Forough Shahab Samani, Rolf Stadler

We present a framework that lets a service provider achieve end-to-end management objectives under varying load.

Blocking Management +1

A System for Interactive Examination of Learned Security Policies

1 code implementation3 Apr 2022 Kim Hammar, Rolf Stadler

We present a system for interactive examination of learned security policies.

Online Feature Selection for Efficient Learning in Networked Systems

no code implementations15 Dec 2021 Xiaoxuan Wang, Rolf Stadler

We present an online algorithm called Online Stable Feature Set Algorithm (OSFS), which selects a small feature set from a large number of available data sources after receiving a small number of measurements.

feature selection

Intrusion Prevention through Optimal Stopping

2 code implementations30 Oct 2021 Kim Hammar, Rolf Stadler

We therefore develop a reinforcement learning approach to approximate an optimal threshold policy.

reinforcement-learning Reinforcement Learning (RL)

Online feature selection for rapid, low-overhead learning in networked systems

no code implementations28 Oct 2020 Xiaoxuan Wang, Forough Shahab Samani, Rolf Stadler

Data-driven functions for operation and management often require measurements collected through monitoring for model training and prediction.

feature selection Management

Predicting SLA Violations in Real Time using Online Machine Learning

no code implementations4 Sep 2015 Jawwad Ahmed, Andreas Johnsson, Rerngvit Yanggratoke, John Ardelius, Christofer Flinta, Rolf Stadler

Detecting faults and SLA violations in a timely manner is critical for telecom providers, in order to avoid loss in business, revenue and reputation.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.