This paper considers key challenges to using reinforcement learning (RL) with attack graphs to automate penetration testing in real-world applications from a systems perspective. RL approaches to automated penetration testing are actively being developed, but there is no consensus view on the representation of computer networks with which RL should be interacting. Moreover, there are significant open challenges to how those representations can be grounded to the real networks where RL solution methods are applied. This paper elaborates on representation and grounding using topic challenges of interacting with real networks in real-time, emulating realistic adversary behavior, and handling unstable, evolving networks. These challenges are bo...
As the world was moving into the generation of Artificial Intelligent (AI), many sectors utilise AI ...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabili...
Penetration testing (PT) is a method for assessing and evaluating the security of digital assets b...
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used ...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the...
The penetration test has many repetitive operations and requires advanced expert knowledge, therefor...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have be...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Network slicing in 5G networks can be modeled as a Virtual Network Embedding (VNE) problem, wherein ...
For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for n...
In network security hardening a network administrator may need to use limited resources (such as hon...
As the world was moving into the generation of Artificial Intelligent (AI), many sectors utilise AI ...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabili...
Penetration testing (PT) is a method for assessing and evaluating the security of digital assets b...
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used ...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the...
The penetration test has many repetitive operations and requires advanced expert knowledge, therefor...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have be...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Network slicing in 5G networks can be modeled as a Virtual Network Embedding (VNE) problem, wherein ...
For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for n...
In network security hardening a network administrator may need to use limited resources (such as hon...
As the world was moving into the generation of Artificial Intelligent (AI), many sectors utilise AI ...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabili...