A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats. In this paper, we attempt to assist human analysts by automating a single host penetration attack. To do so, a smart agent performs different attack sequences to find vulnerabilities in a target system. As it does so, it accumulates knowledge, learns new attack sequences and improves its own internal penetration testing logic. As a result, this agent (AgentPen for simplicity) is able to successfully penetrate hosts it has never interacted with before. A computer security administrator...
The purpose of this thesis is to develop a tool that uses machine learning techniques to make predic...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Cyber vulnerability management is a critical function performed by a cybersecurity operations center...
A significant challenge in modern computer security is the growing skill gap as intruder capabilitie...
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the...
Penetration testing (PT) is a method for assessing and evaluating the security of digital assets by ...
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have be...
Penetration testing is an effective way to test and evaluate cybersecurity by simulating a cyberatta...
A machine learning-based methodology is proposed and implemented for conducting evaluations of cyber...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
The timely and accurate detection of computer and network system intrusions has always been an elusi...
As the world was moving into the generation of Artificial Intelligent (AI), many sectors utilise AI ...
The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the...
The penetration test has many repetitive operations and requires advanced expert knowledge, therefor...
In this work, we aim to develop novel cybersecurity playbooks by exploiting dynamic reinforcement le...
The purpose of this thesis is to develop a tool that uses machine learning techniques to make predic...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Cyber vulnerability management is a critical function performed by a cybersecurity operations center...
A significant challenge in modern computer security is the growing skill gap as intruder capabilitie...
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the...
Penetration testing (PT) is a method for assessing and evaluating the security of digital assets by ...
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have be...
Penetration testing is an effective way to test and evaluate cybersecurity by simulating a cyberatta...
A machine learning-based methodology is proposed and implemented for conducting evaluations of cyber...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
The timely and accurate detection of computer and network system intrusions has always been an elusi...
As the world was moving into the generation of Artificial Intelligent (AI), many sectors utilise AI ...
The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the...
The penetration test has many repetitive operations and requires advanced expert knowledge, therefor...
In this work, we aim to develop novel cybersecurity playbooks by exploiting dynamic reinforcement le...
The purpose of this thesis is to develop a tool that uses machine learning techniques to make predic...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Cyber vulnerability management is a critical function performed by a cybersecurity operations center...