Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (4): 104-120.doi: 10.11959/j.issn.2096-109x.2023057

• Papers • Previous Articles    

Automated Windows domain penetration method based on reinforcement learning

Lige ZHAN1,2, Letian SHA1,2, Fu XIAO1,2, Jiankuo DONG1,2, Pinchang ZHANG1,2   

  1. 1 College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
    2 Jiangsu Provincial Key Laboratory of Wireless Sensor Network High Technology Research, Nanjing 210023, China
  • Revised:2023-03-02 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Key Research and Development Program of China(2018YFB0803400);The National Science Fund for Distinguished Young Scholars of China(62125203);The National Natural Science Foundation of China(62072253)

Abstract:

Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.

Key words: Windows domain, penetration testing, reinforcement learning, attack path

No Suggested Reading articles found!