Abstract
Providing cybersecurity for computer networks is one of the main concerns for companies in this digital society. Unless this is done, companies can potentially lose huge amounts of data or even lose control of their own computer networks. Knowing the topology of the computer network and the information that is accessible on each of the nodes of the network is very relevant information both to establish impenetrable cyber defenses and to spread malware through the network and take control. In the proposed work, an algorithm has been designed to control the propagation of a malware through an unknown computer network in order to extract the information of its network topology. The results of this new algorithm have been tested in 3 simulations on a virtual copy of the same real computer network of an intelligent building in the city of Salamanca. The main result obtained was that the algorithm is able to discover all the nodes of the network adapting itself to the network characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, C., Huang, N., Bai, Y., Zhang, S.: A method of network topology optimization design considering application process characteristic. Mod. Phys. Lett. B 32(07), 1850091 (2018)
Qaqos, N.N., Zeebaree, S.R., Hussan, B.K.: Opnet based performance analysis and comparison among different physical network topologies. Acad. J. Nawroz Univ. 7(3), 48–54 (2018)
Rana, A., Kumar, A., Ali, H.: An overview of the network topologies for enterprises. Asian J. Multidimension. Res. 10(10), 143–149 (2021)
Liu, Y., Wang, H., Cai, L., Shen, X., Zhao, R.: Fundamentals and advancements of topology discovery in underwater acoustic sensor networks: a review. IEEE Sens. J. (2021)
Zhou, S., Cui, L., Fang, C., Chai, S.: Research on network topology discovery algorithm for internet of things based on multi-protocol. In: 2018 10th International Conference on Modelling, Identification and Control (ICMIC), pp. 1–6. IEEE (2018)
Zhang, X.: An optimization algorithm of network topology discovery based on SNMP protocol. J. Comput. Commun. 6(01), 104 (2018)
Popic, S., Vuleta, M., Cvjetkovic, P., Todorović, B.M.: Secure topology detection in software-defined networking with network configuration protocol and link layer discovery protocol. In: 2020 International Symposium on Industrial Electronics and Applications (INDEL), pp. 1–5. IEEE (2020)
Beverly, R.: Yarrp’ing the Internet: randomized high-speed active topology discovery. In: Proceedings of the 2016 Internet Measurement Conference, pp. 413–420 (2016)
Tsai, P.W., Tsai, C.W., Hsu, C.W., Yang, C.S.: Network monitoring in software-defined networking: a review. IEEE Syst. J. 12(4), 3958–3969 (2018)
Majeed, A., Rauf, I.: Graph theory: a comprehensive survey about graph theory applications in computer science and social networks. Inventions 5(1), 10 (2020)
Bhushan, B., Sahoo, G., Rai, A.K.: Man-in-the-middle attack in wireless and computer networking-a review. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), pp. 1–6. IEEE (2017)
Cheng, Y., Geng, J., Wang, Y., Li, J., Li, D., Wu, J.: Bridging machine learning and computer network research: a survey. CCF Trans. Netw. 1, 1–15 (2018). https://doi.org/10.1007/s42045-018-0009-7
Qiao, L., Zhang, L., Chen, S., Shen, D.: Data-driven graph construction and graph learning: a review. Neurocomputing 312, 336–351 (2018)
Georgousis, S., Kenning, M.P., Xie, X.: Graph deep learning: state of the art and challenges. IEEE Access 9, 22106–22140 (2021)
Sutton, R.S., Barto, A.G.: Introduction to Reinforcement Learning (1998)
Shou, Z., Di, X., Ye, J., Zhu, H., Zhang, H., Hampshire, R.: Optimal passenger-seeking policies on E-hailing platforms using Markov decision process and imitation learning. Trans. Res. Part C: Emerg. Technol. 111, 91–113 (2020)
Xie, J., Shao, Z., Li, Y., Guan, Y., Tan, J.: Deep reinforcement learning with optimized reward functions for robotic trajectory planning. IEEE Access 7, 105669–105679 (2019)
del Rey, A.M., Vara, R.C., González, S.R.: A computational propagation model for malware based on the SIR classic model. Neurocomputing 484, 161–171 (2022)
Hernandez Guillen, J.D., Martin del Rey, A., Casado-Vara, R.: Propagation of the malware used in APTs based on dynamic Bayesian networks. Mathematics 9(23), 3097 (2021)
Guillen, J.H., Del Rey, A.M., Casado-Vara, R.: Security countermeasures of a SCIRAS model for advanced malware propagation. IEEE Access 7, 135472–135478 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Casado-Vara, R., Severt, M., del Rey, Á.M., Quintián, H., Calvo-Rolle, J.L. (2023). Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery. In: García Bringas, P., et al. International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022). CISIS ICEUTE 2022 2022. Lecture Notes in Networks and Systems, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-18409-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-18409-3_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18408-6
Online ISBN: 978-3-031-18409-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)