Nothing Special   »   [go: up one dir, main page]

Li et al., 2021 - Google Patents

Cygil: A cyber gym for training autonomous agents over emulated network systems

Li et al., 2021

View PDF
Document ID
4536226884554529600
Author
Li L
Fayad R
Taylor A
Publication year
Publication venue
arXiv preprint arXiv:2109.03331

External Links

Snippet

Given the success of reinforcement learning (RL) in various domains, it is promising to explore the application of its methods to the development of intelligent and autonomous cyber agents. Enabling this development requires a representative RL training environment …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network

Similar Documents

Publication Publication Date Title
Li et al. Cygil: A cyber gym for training autonomous agents over emulated network systems
US12208322B2 (en) Mission-based, game-implemented cyber training system and method
JP6818033B2 (en) Mission-based, game-enabled cyber training systems and methods
EP3600582A1 (en) Mission-based, game-implemented cyber training system and method
Vyas et al. Automated cyber defence: A review
Zakrzewska et al. Modeling cyber conflicts using an extended Petri Net formalism
Wolk et al. Beyond cage: Investigating generalization of learned autonomous network defense policies
Sultana et al. Autonomous network cyber offence strategy through deep reinforcement learning
Kunz et al. A multiagent cyberbattlesim for rl cyber operation agents
Obaidat et al. Creating a large-scale memory error iot botnet using ns3dockeremulator
Bowen et al. Enabling reproducible cyber research-four labeled datasets
CN118400169A (en) Internet of things spoofing trapping strategy evaluation method and system based on DDPG secure game
Oesch et al. Towards a high fidelity training environment for autonomous cyber defense agents
Li et al. Unified emulation-simulation training environment for autonomous cyber agents
Tiloca et al. SEA++: A framework for evaluating the impact of security attacks in OMNeT++/INET
Wang et al. AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game
Dorchuck Goal-Directed Systems Testing: Automated Execution of Intelligently Generated Cyber Attack Plans
Lee-Urban et al. Two complementary network modeling and simulation approaches to aid in understanding advanced cyber threats
Pasquini et al. Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks
US20240291848A1 (en) Autonomous distributed cybersecurity testing
US20240362322A1 (en) Machine learning techniques for automating cyberwarfare training scenarios
Stout et al. Leveraging a LiveNirtual/constructive testbed for the evaluation of moving target defenses
Li et al. Towards Autonomous Cyber Operation Agents: Exploring the Red Case
AABADI et al. Using binary particle swarm optimization for minimization analysis of large-scale network attack graphs
Madison Honeyhive-A Network Intrusion Detection System Framework Utilizing Distributed Internet of Things Honeypot Sensors