In this paper, we are going to verify the possibility to create a ransomware simulation that will use an arbitrary combination of known tactics and techniques to bypass an anti-malware defense. To verify this hypothesis, we conducted an experiment in which an agent was trained with the help of reinforcement learning to run the ransomware simulator in a way that can bypass anti-ransomware solution and encrypt the target files. The novelty of the proposed method lies in applying reinforcement learning to anti-ransomware testing that may help to identify weaknesses in the anti-ransomware defense and fix them before a real attack happens. © 2020 IEEE.open access</p
With the rising number of data breaches, denial of service attacks and general malicious activity fa...
Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to m...
In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and af...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasu...
Many security problems in software systems are because of vulnerabilities caused by improper configu...
In recent years, cybersecurity has been strengthened through the adoption of processes, mechanisms a...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to victim’s data...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
In addition to using signatures, antimalware products also detect malicious attacks by evaluating un...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
With the rising number of data breaches, denial of service attacks and general malicious activity fa...
Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to m...
In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and af...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasu...
Many security problems in software systems are because of vulnerabilities caused by improper configu...
In recent years, cybersecurity has been strengthened through the adoption of processes, mechanisms a...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to victim’s data...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Recent progress in machine learning has led to promising results in behavioral malware detection. Be...
In addition to using signatures, antimalware products also detect malicious attacks by evaluating un...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
With the rising number of data breaches, denial of service attacks and general malicious activity fa...
Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to m...
In today’s fast-evolving market, cybercriminals and threat actors are also developing. During and af...