We study automated intrusion prevention using reinforcement learning. In a novel approach, we formulate the problem of intrusion prevention as an optimal stopping problem. This formulation allows us insight into the structure of the optimal policies, which turn out to be threshold based. Since the computation of the optimal defender policy using dynamic programming is not feasible for practical cases, we approximate the optimal policy through reinforcement learning in a simulation environment. To define the dynamics of the simulation, we emulate the target infrastructure and collect measurements. Our evaluations show that the learned policies are close to optimal and that they indeed can be expressed using thresholds.Comment: Fix typo
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
A growing problem in network security stems from the fact that both attack methods and target system...
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Autonomous Cyber Defence is required to respond to high-tempo cyber-attacks. To facilitate the resea...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Cyber-Physical Systems (CPS) will be core to most emerging computing systems. A myriad of activities...
Cyber vulnerability management is a critical function of a cybersecurity operations center (CSOC) th...
Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in orde...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
A growing problem in network security stems from the fact that both attack methods and target system...
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Autonomous Cyber Defence is required to respond to high-tempo cyber-attacks. To facilitate the resea...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Cyber-Physical Systems (CPS) will be core to most emerging computing systems. A myriad of activities...
Cyber vulnerability management is a critical function of a cybersecurity operations center (CSOC) th...
Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in orde...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
A growing problem in network security stems from the fact that both attack methods and target system...