Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities.
Ahmed Mohamed AhmedThanh Thi NguyenMohamed Almorsy AbdelrazekSunil AryalPublished in: Neural Comput. Appl. (2024)
Keyphrases
- computer networks
- reinforcement learning
- attack graphs
- autonomous learning
- attack scenarios
- intrusion detection system
- attack graph
- computer systems
- network security
- network traffic
- state space
- network management
- communication networks
- security problems
- data transmission
- robotic systems
- alert correlation
- network monitoring
- information security
- tcp ip
- intrusion detection
- databases
- security vulnerabilities
- anomaly detection
- learning algorithm