TY - GEN
T1 - Intelligent jamming using deep q-learning
AU - Thurston, Noah
AU - Vanhoy, Garrett
AU - Bose, Tamal
N1 - Funding Information:
Copyright © held by the author; distribution rights International Foundation for Telemetering
Publisher Copyright:
© held by the author; distribution rights International Foundation for Telemetering.
PY - 2018
Y1 - 2018
N2 - The threat of a malicious user interfering with network traffic so as to deny access to resources is an inherent vulnerability of wireless networks. To combat this threat, physical layer waveforms that are resilient to interference are used to relay critical traffic. These waveforms are designed to make it difficult for a malicious user to both deny access to network resources and avoid detection. If a malicious user has perfect knowledge of the waveform being used, it can avoid detection and deny network throughput, but this knowledge is naturally limited in practice. In this work, the threat of a malicious user that can implicitly learn the nature of the waveform being used simply by observing reactions to its behavior is analyzed and potential mitigation techniques are discussed. The results show that using recurrent neural networks to implement deep Q-learning, a malicious user can converge on an optimal interference policy that simultaneously minimizes the potential for it to be detected and maximizes its impediment on network traffic.
AB - The threat of a malicious user interfering with network traffic so as to deny access to resources is an inherent vulnerability of wireless networks. To combat this threat, physical layer waveforms that are resilient to interference are used to relay critical traffic. These waveforms are designed to make it difficult for a malicious user to both deny access to network resources and avoid detection. If a malicious user has perfect knowledge of the waveform being used, it can avoid detection and deny network throughput, but this knowledge is naturally limited in practice. In this work, the threat of a malicious user that can implicitly learn the nature of the waveform being used simply by observing reactions to its behavior is analyzed and potential mitigation techniques are discussed. The results show that using recurrent neural networks to implement deep Q-learning, a malicious user can converge on an optimal interference policy that simultaneously minimizes the potential for it to be detected and maximizes its impediment on network traffic.
UR - http://www.scopus.com/inward/record.url?scp=85062735241&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85062735241&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85062735241
T3 - Proceedings of the International Telemetering Conference
BT - 54th Annual International Telemetering Conference and Technical Exhibition, ITC 2018
PB - International Foundation for Telemetering
T2 - 54th Annual International Telemetering Conference and Technical Exhibition: Reliable and Secure Data, Links and Networks, ITC 2018
Y2 - 5 November 2018 through 8 November 2018
ER -