[HTML][HTML] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
X Feng, J Han, R Zhang, S Xu, H **a - High-Confidence Computing, 2024 - Elsevier
Currently, important privacy data of the Internet of Things (IoT) face extremely high risks of
leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain …
leakage. Attackers persistently engage in continuous attacks on terminal devices to obtain …
Scalable learning of intrusion response through recursive decomposition
We study automated intrusion response for an IT infrastructure and formulate the interaction
between an attacker and a defender as a partially observed stochastic game. To solve the …
between an attacker and a defender as a partially observed stochastic game. To solve the …
Towards a high fidelity training environment for autonomous cyber defense agents
S Oesch, A Chaulagain, B Weber, M Dixson… - Proceedings of the 17th …, 2024 - dl.acm.org
Cyber defenders are overwhelmed by the frequency and scale of attacks against their
networks. This problem will only be exacerbated as attackers leverage AI to automate their …
networks. This problem will only be exacerbated as attackers leverage AI to automate their …
Beyond cage: Investigating generalization of learned autonomous network defense policies
M Wolk, A Applebaum, C Dennler, P Dwyer… - arxiv preprint arxiv …, 2022 - arxiv.org
Advancements in reinforcement learning (RL) have inspired new directions in intelligent
automation of network defense. However, many of these advancements have either …
automation of network defense. However, many of these advancements have either …
Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations
E Hemberg, MJ Turner, N Rutar… - Digital Threats: Research …, 2024 - dl.acm.org
Cross-linked threat, vulnerability, and defensive mitigation knowledge is critical in defending
against diverse and dynamic cyber threats. Cyber analysts consult it by deductively or …
against diverse and dynamic cyber threats. Cyber analysts consult it by deductively or …
A Comprehensive State-of-the-Art Review for Digital Twin: Cybersecurity Perspectives and Open Challenges
The growing complexity and interconnectivity of modern systems have made the proactive
identification and mitigation of vulnerabilities increasingly challenging. DTs, which offer …
identification and mitigation of vulnerabilities increasingly challenging. DTs, which offer …
An online framework for adapting security policies in dynamic it environments
We present an online framework for learning and updating security policies in dynamic IT
environments. It includes three components: a digital twin of the target system, which …
environments. It includes three components: a digital twin of the target system, which …