2020
DOI: 10.1145/3418897
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP

Abstract: Growing multi-stage attacks in computer networks impose significant security risks and necessitate the development of effective defense schemes that are able to autonomously respond to intrusions during vulnerability windows. However, the defender faces several real-world challenges, e.g., unknown likelihoods and unknown impacts of successful exploits. In this article, we leverage reinforcement learning to develop an innovative adaptive cyber defense to maximize the cost-effectiveness subject to the aforementi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(28 citation statements)
references
References 43 publications
0
28
0
Order By: Relevance
“…Many recent results of automating security strategies have been obtained using reinforcement learning methods. In particular, a large number of studies have focused on intrusion prevention use cases similar to the one we discuss in this paper [13], [14], [26], [27], [19], [25], [28], [20], [29], [21], [22], [24], [83], [84], [85], [23], [86], [33], [35], [34].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Many recent results of automating security strategies have been obtained using reinforcement learning methods. In particular, a large number of studies have focused on intrusion prevention use cases similar to the one we discuss in this paper [13], [14], [26], [27], [19], [25], [28], [20], [29], [21], [22], [24], [83], [84], [85], [23], [86], [33], [35], [34].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
“…These works use a variety of models, including MDPs [19], [20], [21], [22], [23], [35], Markov games [26], [13], [83], [33], attack graphs [34], and POMDPs [14], [24], [25], as well as various reinforcement learning algorithms, including Q-learning [26], [19], [20], [36], SARSA [25], PPO [13], [14], [34], [35], hierarchical reinforcement learning [21], DQN [22], Thompson sampling [24], MuZero [83], NFQ [84], DDQN [23], NFSP [37], and DDPG [85], [33].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
See 3 more Smart Citations