Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
by
Park, Jongyoul
, Oh, Sang Ho
, Nah, Jae Hoon
, Kim, Jeongyoon
in
Algorithms
/ Artificial intelligence
/ Automation
/ Complexity
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Decision making
/ Deep learning
/ Defense mechanisms
/ Internet
/ Machine learning
/ Methods
/ Prevention
/ Reinforcement learning (Machine learning)
/ Safety and security measures
/ Simulation
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
by
Park, Jongyoul
, Oh, Sang Ho
, Nah, Jae Hoon
, Kim, Jeongyoon
in
Algorithms
/ Artificial intelligence
/ Automation
/ Complexity
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Decision making
/ Deep learning
/ Defense mechanisms
/ Internet
/ Machine learning
/ Methods
/ Prevention
/ Reinforcement learning (Machine learning)
/ Safety and security measures
/ Simulation
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
by
Park, Jongyoul
, Oh, Sang Ho
, Nah, Jae Hoon
, Kim, Jeongyoon
in
Algorithms
/ Artificial intelligence
/ Automation
/ Complexity
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Decision making
/ Deep learning
/ Defense mechanisms
/ Internet
/ Machine learning
/ Methods
/ Prevention
/ Reinforcement learning (Machine learning)
/ Safety and security measures
/ Simulation
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
Journal Article
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
2024
Request Book From Autostore
and Choose the Collection Method
Overview
In the current landscape where cybersecurity threats are escalating in complexity and frequency, traditional defense mechanisms like rule-based firewalls and signature-based detection are proving inadequate. The dynamism and sophistication of modern cyber-attacks necessitate advanced solutions that can evolve and adapt in real-time. Enter the field of deep reinforcement learning (DRL), a branch of artificial intelligence that has been effectively tackling complex decision-making problems across various domains, including cybersecurity. In this study, we advance the field by implementing a DRL framework to simulate cyber-attacks, drawing on authentic scenarios to enhance the realism and applicability of the simulations. By meticulously adapting DRL algorithms to the nuanced requirements of cybersecurity contexts—such as custom reward structures and actions, adversarial training, and dynamic environments—we provide a tailored approach that significantly improves upon traditional methods. Our research undertakes a thorough comparative analysis of three sophisticated DRL algorithms—deep Q-network (DQN), actor–critic, and proximal policy optimization (PPO)—against the traditional RL algorithm Q-learning, within a controlled simulation environment reflective of real-world cyber threats. The findings are striking: the actor–critic algorithm not only outperformed its counterparts with a success rate of 0.78 but also demonstrated superior efficiency, requiring the fewest iterations (171) to complete an episode and achieving the highest average reward of 4.8. In comparison, DQN, PPO, and Q-learning lagged slightly behind. These results underscore the critical impact of selecting the most fitting algorithm for cybersecurity simulations, as the right choice leads to more effective learning and defense strategies. The impressive performance of the actor–critic algorithm in this study marks a significant stride towards the development of adaptive, intelligent cybersecurity systems capable of countering the increasingly sophisticated landscape of cyber threats. Our study not only contributes a robust model for simulating cyber threats but also provides a scalable framework that can be adapted to various cybersecurity challenges.
Publisher
MDPI AG
This website uses cookies to ensure you get the best experience on our website.