Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
by
Nguyen, Thanh Thi
, Abdelrazek, Mohamed
, Aryal, Sunil
, Mohamed Ahmed, Ahmed
in
Artificial Intelligence
/ Computational Biology/Bioinformatics
/ Computational Science and Engineering
/ Computer Science
/ Data Mining and Knowledge Discovery
/ Image Processing and Computer Vision
/ Original Article
/ Probability and Statistics in Computer Science
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
by
Nguyen, Thanh Thi
, Abdelrazek, Mohamed
, Aryal, Sunil
, Mohamed Ahmed, Ahmed
in
Artificial Intelligence
/ Computational Biology/Bioinformatics
/ Computational Science and Engineering
/ Computer Science
/ Data Mining and Knowledge Discovery
/ Image Processing and Computer Vision
/ Original Article
/ Probability and Statistics in Computer Science
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
by
Nguyen, Thanh Thi
, Abdelrazek, Mohamed
, Aryal, Sunil
, Mohamed Ahmed, Ahmed
in
Artificial Intelligence
/ Computational Biology/Bioinformatics
/ Computational Science and Engineering
/ Computer Science
/ Data Mining and Knowledge Discovery
/ Image Processing and Computer Vision
/ Original Article
/ Probability and Statistics in Computer Science
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
Journal Article
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
2024
Request Book From Autostore
and Choose the Collection Method
Overview
In today’s intricate information technology landscape, the escalating complexity of computer networks is accompanied by a myriad of malicious threats seeking to compromise network components. To address these security challenges, we propose an approach that synergizes reinforcement learning and deep neural networks. Our method involves training autonomous cyber-agents to strategically attack network nodes, aiming to expose vulnerabilities and extract confidential information. We employ various off-policy deep reinforcement learning algorithms, including deep Q-network (DQN), double DQN, and dueling DQN, to train and evaluate these agents within two enterprise simulation networks provided by Microsoft. The simulations, modeled as Markov games between attack and defense, exclude human intervention. Results demonstrate that agents trained by double DQN and dueling DQN surpass baseline agents trained using traditional reinforcement learning and DQN methods. This approach not only enhances our understanding of network vulnerabilities but also lays the groundwork for future efforts to fortify computer network defense and security.
Publisher
Springer London
This website uses cookies to ensure you get the best experience on our website.