Show simple item record

dc.contributor.advisorHemberg, Erik
dc.contributor.advisorO’Reilly, Una-May
dc.contributor.authorLiu, Kyle
dc.date.accessioned2023-07-31T19:47:35Z
dc.date.available2023-07-31T19:47:35Z
dc.date.issued2023-06
dc.date.submitted2023-06-06T16:35:39.836Z
dc.identifier.urihttps://hdl.handle.net/1721.1/151545
dc.description.abstractMachine Learning techniques can provide insight in a variety of inference tasks involving not only text data but also source code. We apply these techniques to BRON, a graph database linking cybersecurity threats, vulnerability sources, and mitigation techniques, in order to extract a wider variety of relationships, and more effectively analyze them. We find that prompt engineering in large language models improves performance in edge classification within BRON. We in addition explore these inferences in practice, by modeling the interaction between cybersecurity attackers and defenders on a given network in a zero-sum game. We apply coevolution in a novel multi-step feedback framework to improve performance in modelling attacks, and find that allowing attackers to dynamically select their attack strategies improves their payoff.
dc.publisherMassachusetts Institute of Technology
dc.rightsIn Copyright - Educational Use Permitted
dc.rightsCopyright retained by author(s)
dc.rights.urihttps://rightsstatements.org/page/InC-EDU/1.0/
dc.titleInference of Cyber Threats, Vulnerabilities, and Mitigations to Enhance Cybersecurity Simulations
dc.typeThesis
dc.description.degreeM.Eng.
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
mit.thesis.degreeMaster
thesis.degree.nameMaster of Engineering in Electrical Engineering and Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record