Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while trying to evade risk. RL is utilized to support the development of these routes by building a reward mechanism that would help in realization of these paths. The RL algorithm is modified to have a novel warm-up phase which decides in the initial exploration which areas of the network are safe to explore based on the rewards and penalty scale facto...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
In this work, we aim to develop novel cybersecurity playbooks by exploiting dynamic reinforcement le...
This paper considers key challenges to using reinforcement learning (RL) with attack graphs to autom...
DDoS attacks plague the availability of online services today, yet like many cybersecurity problems ...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
In the domain of Wireless Sensor Networks (WSNs), where resources are limited and dynamic threats pe...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Rapid shifting by government sectors and companies to provide their services and products over the i...
A priority task for homeland security is the coverage of large spans of open border that cannot be c...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Social networks are frequently polluted by rumors, which can be detected by advanced models such as ...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
In this work, we aim to develop novel cybersecurity playbooks by exploiting dynamic reinforcement le...
This paper considers key challenges to using reinforcement learning (RL) with attack graphs to autom...
DDoS attacks plague the availability of online services today, yet like many cybersecurity problems ...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
In the domain of Wireless Sensor Networks (WSNs), where resources are limited and dynamic threats pe...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Rapid shifting by government sectors and companies to provide their services and products over the i...
A priority task for homeland security is the coverage of large spans of open border that cannot be c...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Social networks are frequently polluted by rumors, which can be detected by advanced models such as ...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...