Intrusion Response is a relatively new field of research. Several model-based techniques have been proposed that range from static mapping to complex stateful approaches. However, the main limitation that all of them have in common is that they do not consider the non-stationary behavior of the protected system which, in combination with long planning times, makes it unfeasible to use them on dynamic and large-scale systems. In this work, we propose an Intrusion Response controller based on deep reinforcement learning and transfer learning, which automatically adapts to system changes. We empirically demonstrate its effectiveness and its performance on Online Boutique, a cloud-based web application that Google uses to showcase its cloud tec...
Security concerns for Internet of Things (IoT) applications have been alarming because of their wide...
In the open network environment, industrial control systems face huge security risks and are often s...
Cyberattacks in the Internet of Things (IoT) are growing exponentially, especially zero-day attacks ...
Intrusion Response is a relatively new field of research. Several model-based techniques have been p...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
With the rising number of data breaches, denial of service attacks and general malicious activity fa...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
Cyberattacks on Cyber-Physical Systems (CPSs) are on the rise due to CPS increased networked connect...
The timely and accurate detection of computer and network system intrusions has always been an elusi...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Security concerns for IoT applications have been alarming because of their widespread use in differe...
The Internet of Things (IoT) scenario places important challenges even for deep learning-based intru...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Security concerns for Internet of Things (IoT) applications have been alarming because of their wide...
In the open network environment, industrial control systems face huge security risks and are often s...
Cyberattacks in the Internet of Things (IoT) are growing exponentially, especially zero-day attacks ...
Intrusion Response is a relatively new field of research. Several model-based techniques have been p...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
With the rising number of data breaches, denial of service attacks and general malicious activity fa...
Given the always increasing size of computer systems, manually protecting them in case of attacks is...
Cyberattacks on Cyber-Physical Systems (CPSs) are on the rise due to CPS increased networked connect...
The timely and accurate detection of computer and network system intrusions has always been an elusi...
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient...
Security concerns for IoT applications have been alarming because of their widespread use in differe...
The Internet of Things (IoT) scenario places important challenges even for deep learning-based intru...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Security concerns for Internet of Things (IoT) applications have been alarming because of their wide...
In the open network environment, industrial control systems face huge security risks and are often s...
Cyberattacks in the Internet of Things (IoT) are growing exponentially, especially zero-day attacks ...