Defense Mechanism of Interest Flooding Attack Based on Deep Reinforcement Learning

Author(s):  
Jie Zhou ◽  
Jiangtao Luo ◽  
Lianglang Deng ◽  
Junxia Wang
Author(s):  
Juan Parras ◽  
Santiago Zazo

The significant increase in the number of interconnected devices has brought new services and applications, as well as new network vulnerabilities. The increasing hardware capacities of these devices and the developments in the artificial intelligence field mean that new and complex attack methods are being developed. This chapter focuses on the backoff attack in a wireless network using CSMA/CA multiple access, and it shows that an intelligent attacker, making use of control theory, can successfully exploit a sequential probability ratio test-based defense mechanism. Also, recent developments in the deep reinforcement learning field allows that attackers that do not have full knowledge of the defense mechanism are able to successfully learn to attack it. Thus, this chapter illustrates by means of the backoff attack, the possibilities that the recent advances in the artificial intelligence field bring to intelligent attackers, and highlights the importance of researching in intelligent defense methods able to cope with such attackers.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4060
Author(s):  
Juan Parras ◽  
Maximilian Hüttenrauch ◽  
Santiago Zazo ◽  
Gerhard Neumann

Recent advances in Deep Reinforcement Learning allow solving increasingly complex problems. In this work, we show how current defense mechanisms in Wireless Sensor Networks are vulnerable to attacks that use these advances. We use a Deep Reinforcement Learning attacker architecture that allows having one or more attacking agents that can learn to attack using only partial observations. Then, we subject our architecture to a test-bench consisting of two defense mechanisms against a distributed spectrum sensing attack and a backoff attack. Our simulations show that our attacker learns to exploit these systems without having a priori information about the defense mechanism used nor its concrete parameters. Since our attacker requires minimal hyper-parameter tuning, scales with the number of attackers, and learns only by interacting with the defense mechanism, it poses a significant threat to current defense procedures.


Author(s):  
Olya Khaleelee

This paper describes the use of the Defense Mechanism Test as an aid in helping to assess senior executives in four areas: for selection, development, career strategy, and crisis intervention. The origins of this test, developed to measure the defense mechanisms used to protect the individual from stress, are described. The paper shows how it was used to predict the capacity of trainee fighter pilots to withstand stress and its later application to other stressful occupations. Finally, some ideal types of the test are shown followed by four real test profiles, two of them with their associated histories.


Decision ◽  
2016 ◽  
Vol 3 (2) ◽  
pp. 115-131 ◽  
Author(s):  
Helen Steingroever ◽  
Ruud Wetzels ◽  
Eric-Jan Wagenmakers

Sign in / Sign up

Export Citation Format

Share Document