AI-enabled IoT penetration testing: state-of-the-art and research challenges

C Greco, G Fortino, B Crispo… - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …

An analysis on financial statement fraud detection for Chinese listed companies using deep learning

W **uguo, D Shengyong - Ieee Access, 2022 - ieeexplore.ieee.org
Financial fraud has extremely damaged the sustainable growth of financial markets as a
serious problem worldwide. Nevertheless, it is fairly challenging to identify frauds with highly …

GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning

J Chen, S Hu, H Zheng, C **ng, G Zhang - Computers & Security, 2023 - Elsevier
Penetration testing (PT) is an efficient tool for network testing and vulnerability mining by
simulating the hackers' attacks to obtain valuable information applied in operating and …

Cygil: A cyber gym for training autonomous agents over emulated network systems

L Li, R Fayad, A Taylor - arxiv preprint arxiv:2109.03331, 2021 - arxiv.org
Given the success of reinforcement learning (RL) in various domains, it is promising to
explore the application of its methods to the development of intelligent and autonomous …

Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques

F Louati, FB Ktata, I Amous - SN Computer Science, 2024 - Springer
Intrusion detection systems (IDSs) play a crucial role in network security, as the need for
secure networks continues to grow. However, traditional IDSs are not able to accurately and …

[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

L Erdődi, ÅÅ Sommervoll, FM Zennaro - Journal of Information Security and …, 2021 - Elsevier
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …

Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge

FM Zennaro, L Erdődi - IET Information Security, 2023 - Wiley Online Library
Penetration testing is a security exercise aimed at assessing the security of a system by
simulating attacks against it. So far, penetration testing has been carried out mainly by …

Research and challenges of reinforcement learning in cyber defense decision-making for intranet security

W Wang, D Sun, F Jiang, X Chen, C Zhu - Algorithms, 2022 - mdpi.com
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …

The Agent Web Model: modeling web hacking for reinforcement learning

L Erdődi, FM Zennaro - International Journal of Information Security, 2022 - Springer
Website hacking is a frequent attack type used by malicious actors to obtain confidential
information, modify the integrity of web pages or make websites unavailable. The tools used …

Distributed web hacking by adaptive consensus-based reinforcement learning

N Ilić, D Dašić, M Vučetić, A Makarov, R Petrović - Artificial Intelligence, 2024 - Elsevier
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …