Architecture
NetSecGame Architecture
The Network Security Game(NSG) works as a game server - agents connect to it via TCP sockets and interact with the environment using the standard RL communication loop: Agent submits actinon and recieves new observation of the environment. The NSG supports real-time, highly customizable multi-agent simulations.
Game Components
The following classes are used in the game to hold information about the state of the game. They are used both in the Actions and GameState. See the API Reference for GameComponents
Building blocks
IP
IP is immutable object that represents an IPv4 object in the NetSecGame. It has a single parameter of the address in a dot-decimal notation (4 octet represeted as decimal value separeted by dots).
Example:
ip = IP("192.168.1.1")
Network
Network is immutable object that represents an IPv4 network object in the NetSecGame. It has 2 parameters:
- network_ip:str
representing the IPv4 address of the network.
- mask:int
representing the mask in the CIDR notation.
Example:
net = Network("192.168.1.0", 24)
Service
Service class holds information about services running in hosts. Each Service has four parameters:
- name
:str - Name of the service (e.g., "SSH")
- type
:str - passive
or active
. Currently not being used.
- version
:str - version of the service.
- is_local
:bool - flag specifying if the service is local only. (if True
, service is NOT visible without controlling the host).
Example:
s = Service('postgresql', 'passive', '14.3.0', False)
Data
Data class holds information about datapoints (files) present in the NetSecGame.
Each data instance has two parameters:
- owner
:str - specifying the user who owns this datapoint
- id
: str - unique identifier of the datapoint in a host
- size
: int - size of the datapoint (optional, default=0)
- type
: str - identification of a type of the file (optional, default="")
- content
: str - content of the data (optional, default="")
Examples:
d1 = Data("User1", "DatabaseData")
d2 = Data("User1", "DatabaseData", size=42, type="txt", "SecretUserDatabase")
GameState
GameState is an object that represents a view of the NetSecGame environment in a given state. It is constructed as a collection of 'assets' available to the agent. GameState has following parts:
- known_networks
: Set of Network objects that the agent is aware of
- known_hosts
: Set of IP objects that the agent is aware of
- controlled_hosts
: Set of IP objetcs that the agent has control over. Note that controlled_hosts
is a subset of known_hosts
.
- known_services
: Dictionary of services that the agent is aware of.
The dictionary format: {IP
: {Service
}} where IP object is a key and the value is a set of Service objects located in the IP
.
- known_data
: Dictionary of data instances that the agent is aware of. The dictionary format: {IP
: {Data
}} where IP object is a key and the value is a set of Data objects located in the IP
.
- known_blocks
: Dictionary of firewall blocks the agent is aware of. It is a dictionary with format: {target_IP
: {blocked_IP
, blocked_IP
}}. Where target_IP
is the IP where the FW rule was applied (usually a router) and blocked_IP
is the IP address that is blocked. For now the blocks happen in both input and output direction simultaneously.
Actions
Actions are the objects sent by the agents to the environment. Each action is evaluated by NetSecGame and executed if 1. It is a valid Action 2. Can be processed in the current state of the environment
In all cases, when an agent sends an action to NetSecGame, it is given a response.
Action format
The Action consists of two parts 1. ActionType - specifying the class of the action 2. parameters - dictionary with specific parameters related to the used ActionType
List of ActionTypes
- JoinGame, params={
agent_info
:AgentInfo(<name>
,<role>
)}: Used to register agent in a game with a given<role>
. - QuitGame, params={}: Used for termination of agent's interaction.
- ResetGame, params={
request_trajectory
:bool
}: Used for requesting reset of the game to it's initial position. Ifrequest_trajectory = True
, the coordinator will send back the complete trajectory of the previous run in the next message.
- ScanNetwork, params{
source_host
:<IP>
,target_network
:<Network>
}: Scans the given<Network>
from a specified source host. Discovers ALL hosts in a network that are accessible from<IP>
. If successful, returns set of discovered<IP>
objects. - FindServices, params={
source_host
:<IP>
,target_host
:<IP>
}: Used to discover ALL services running in thetarget_host
if the host is accessible fromsource_host
. If successful, returns a set of all discovered<Service>
objects. - FindData, params={
source_host
:<IP>
,target_host
:<IP>
}: Searchestarget_host
for data. Ifsource_host
differs fromtarget_host
, success depends on accessability from thesource_host
. If successful, returns a set of all discovered<Data>
objects. - ExploitService, params={
source_host
:<IP>
,target_host
:<IP>
,taget_service
:<Service>
}: Exploitstarget_service
in a specifiedtarget_host
. If successful, the attacker gains control of thetarget_host
. - ExfiltrateData, params{
source_host
:<IP>
,target_host
:<IP>
,data
:<IP>
}: Copiesdata
from thesource_host
totarget_host
IF both are controlled andtarget_host
is accessible fromsource_host
.
Action preconditions and effects
In the following table, we describe the effects of selected actions and their preconditions. Note that if the preconditions are not satisfied, the actions's effects are not applied.
Action | Params | Preconditions | Effects |
---|---|---|---|
ScanNetwork | source_host , target_network |
source_host ∈ controlled_hosts |
extends known_networks |
FindServices | source_host , target_host |
source_host ∈ controlled_hosts |
extends known_services AND known_hosts |
FindData | source_host , target_host |
source_host , target_host ∈ controlled_hosts |
extends known_data |
Exploit Service | source_host , target_host , target_service |
source_host ∈ controlled_hosts |
extends controlled_hosts with target_host |
ExfiltrateData | source_host ,target_host , data |
source_host , target_host ∈ controlled_hosts AND data ∈ known_data |
extends known_data[target_host] with data |
BlockIP | source_host , target_host , blockedIP |
source_host ∈ controlled_hosts |
extends known_blocks[target_host] with blockedIP |
Assumption and Conditions for Actions
- When playing the
ExploitService
action, it is expected that the agent has discovered this service before (by playingFindServices
in thetarget_host
before this action) - The
Find Data
action finds all the available data in the host if successful. - The
Find Data
action requires ownership of the target host. - Playing
ExfiltrateData
requires controlling BOTH source and target hosts - Playing
Find Services
can be used to discover hosts (if those have any active services) - Parameters of
ScanNetwork
andFindServices
can be chosen arbitrarily (they don't have to be listed inknown_newtworks
/known_hosts
)
Observations
After submitting Action a
to the environment, agents receive an Observation
in return. Each observation consists of 4 parts:
- state
:Gamestate
- with the current view of the environment state
- reward
: int
- with the immediate reward agent gets for playing Action a
- end
:bool
- indicating if the interaction can continue after playing Action a
- info
: dict
- placeholder for any information given to the agent (e.g., the reason why end is True
)