Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
Åvald Åslaugson SommervollLászló ErdodiFabio Massimo ZennaroPublished in: Int. J. Inf. Sec. (2024)
Keyphrases
- reinforcement learning agents
- security vulnerabilities
- sql injection
- dynamic environments
- reinforcement learning
- unauthorized access
- injection attacks
- state abstraction
- intrusion detection
- multi agent environments
- transfer learning
- multi agent
- web applications
- access control
- security issues
- dos attacks
- learning algorithm
- cooperative
- state space
- security properties
- sensitive data
- countermeasures
- third party
- data management