2021
DOI: 10.48550/arxiv.2108.09358
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Crown Jewels Analysis using Reinforcement Learning with Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Most frequently, RL is tasked with simply traversing a network from one initial node to one terminal node-(i.e., finding paths through networks) [2]- [9]. Gangupantulu et al, in contrast, emphasize a more complex task of using RL to perform CJ analysis [10]. Here, similar to Gangupantulu et al, the presented RL method solves a more complex task and serves as a targeted tool for cyber operators to improve the efficiency of operator workflow in penetration testing.…”
Section: B Rl For Penetration Testingmentioning
confidence: 95%
See 4 more Smart Citations
“…Most frequently, RL is tasked with simply traversing a network from one initial node to one terminal node-(i.e., finding paths through networks) [2]- [9]. Gangupantulu et al, in contrast, emphasize a more complex task of using RL to perform CJ analysis [10]. Here, similar to Gangupantulu et al, the presented RL method solves a more complex task and serves as a targeted tool for cyber operators to improve the efficiency of operator workflow in penetration testing.…”
Section: B Rl For Penetration Testingmentioning
confidence: 95%
“…While deep RL has been applied to cybersecurity broadly [21], it has only recently been pursued as a tool for penetration testing [2]- [10]. While approaches and uses vary greatly, many use attack graphs to model the network [22].…”
Section: B Rl For Penetration Testingmentioning
confidence: 99%
See 3 more Smart Citations