Skip to main content

Abstract

Providing cybersecurity for computer networks is one of the main concerns for companies in this digital society. Unless this is done, companies can potentially lose huge amounts of data or even lose control of their own computer networks. Knowing the topology of the computer network and the information that is accessible on each of the nodes of the network is very relevant information both to establish impenetrable cyber defenses and to spread malware through the network and take control. In the proposed work, an algorithm has been designed to control the propagation of a malware through an unknown computer network in order to extract the information of its network topology. The results of this new algorithm have been tested in 3 simulations on a virtual copy of the same real computer network of an intelligent building in the city of Salamanca. The main result obtained was that the algorithm is able to discover all the nodes of the network adapting itself to the network characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, C., Huang, N., Bai, Y., Zhang, S.: A method of network topology optimization design considering application process characteristic. Mod. Phys. Lett. B 32(07), 1850091 (2018)

    Google Scholar 

  2. Qaqos, N.N., Zeebaree, S.R., Hussan, B.K.: Opnet based performance analysis and comparison among different physical network topologies. Acad. J. Nawroz Univ. 7(3), 48–54 (2018)

    Article  Google Scholar 

  3. Rana, A., Kumar, A., Ali, H.: An overview of the network topologies for enterprises. Asian J. Multidimension. Res. 10(10), 143–149 (2021)

    Article  Google Scholar 

  4. Liu, Y., Wang, H., Cai, L., Shen, X., Zhao, R.: Fundamentals and advancements of topology discovery in underwater acoustic sensor networks: a review. IEEE Sens. J. (2021)

    Google Scholar 

  5. Zhou, S., Cui, L., Fang, C., Chai, S.: Research on network topology discovery algorithm for internet of things based on multi-protocol. In: 2018 10th International Conference on Modelling, Identification and Control (ICMIC), pp. 1–6. IEEE (2018)

    Google Scholar 

  6. Zhang, X.: An optimization algorithm of network topology discovery based on SNMP protocol. J. Comput. Commun. 6(01), 104 (2018)

    Article  Google Scholar 

  7. Popic, S., Vuleta, M., Cvjetkovic, P., Todorović, B.M.: Secure topology detection in software-defined networking with network configuration protocol and link layer discovery protocol. In: 2020 International Symposium on Industrial Electronics and Applications (INDEL), pp. 1–5. IEEE (2020)

    Google Scholar 

  8. Beverly, R.: Yarrp’ing the Internet: randomized high-speed active topology discovery. In: Proceedings of the 2016 Internet Measurement Conference, pp. 413–420 (2016)

    Google Scholar 

  9. Tsai, P.W., Tsai, C.W., Hsu, C.W., Yang, C.S.: Network monitoring in software-defined networking: a review. IEEE Syst. J. 12(4), 3958–3969 (2018)

    Article  Google Scholar 

  10. Majeed, A., Rauf, I.: Graph theory: a comprehensive survey about graph theory applications in computer science and social networks. Inventions 5(1), 10 (2020)

    Article  Google Scholar 

  11. Bhushan, B., Sahoo, G., Rai, A.K.: Man-in-the-middle attack in wireless and computer networking-a review. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), pp. 1–6. IEEE (2017)

    Google Scholar 

  12. Cheng, Y., Geng, J., Wang, Y., Li, J., Li, D., Wu, J.: Bridging machine learning and computer network research: a survey. CCF Trans. Netw. 1, 1–15 (2018). https://doi.org/10.1007/s42045-018-0009-7

    Article  Google Scholar 

  13. Qiao, L., Zhang, L., Chen, S., Shen, D.: Data-driven graph construction and graph learning: a review. Neurocomputing 312, 336–351 (2018)

    Article  Google Scholar 

  14. Georgousis, S., Kenning, M.P., Xie, X.: Graph deep learning: state of the art and challenges. IEEE Access 9, 22106–22140 (2021)

    Article  Google Scholar 

  15. Sutton, R.S., Barto, A.G.: Introduction to Reinforcement Learning (1998)

    Google Scholar 

  16. Shou, Z., Di, X., Ye, J., Zhu, H., Zhang, H., Hampshire, R.: Optimal passenger-seeking policies on E-hailing platforms using Markov decision process and imitation learning. Trans. Res. Part C: Emerg. Technol. 111, 91–113 (2020)

    Article  Google Scholar 

  17. Xie, J., Shao, Z., Li, Y., Guan, Y., Tan, J.: Deep reinforcement learning with optimized reward functions for robotic trajectory planning. IEEE Access 7, 105669–105679 (2019)

    Article  Google Scholar 

  18. del Rey, A.M., Vara, R.C., González, S.R.: A computational propagation model for malware based on the SIR classic model. Neurocomputing 484, 161–171 (2022)

    Article  Google Scholar 

  19. Hernandez Guillen, J.D., Martin del Rey, A., Casado-Vara, R.: Propagation of the malware used in APTs based on dynamic Bayesian networks. Mathematics 9(23), 3097 (2021)

    Article  Google Scholar 

  20. Guillen, J.H., Del Rey, A.M., Casado-Vara, R.: Security countermeasures of a SCIRAS model for advanced malware propagation. IEEE Access 7, 135472–135478 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roberto Casado-Vara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Casado-Vara, R., Severt, M., del Rey, Á.M., Quintián, H., Calvo-Rolle, J.L. (2023). Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery. In: García Bringas, P., et al. International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022). CISIS ICEUTE 2022 2022. Lecture Notes in Networks and Systems, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-18409-3_17

Download citation

Publish with us

Policies and ethics