2020
DOI: 10.48550/arxiv.2002.10667
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

CybORG: An Autonomous Cyber Operations Research Gym

Callum Baillie,
Maxwell Standen,
Jonathon Schwartz
et al.

Abstract: Autonomous Cyber Operations (ACO) involves the consideration of blue team (defender) and red team (attacker) decision-making models in adversarial scenarios. To support the application of machine learning algorithms to solve this problem, and to encourage such practitioners to attend to problems in the ACO setting, a suitable gym (toolkit for experiments) is necessary. We introduce CybORG, a work-inprogress gym for ACO research. Driven by the need to efficiently support reinforcement learning to train adversar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…A similar experience to [12] was described more recently by [18] which targets research in Autonomous Cyber Operations (ACO). The authors of [18] proposed a high-fidelity emulation using VMs, and a low-fidelity simulation using a finite state machine design that could model networks.…”
Section: Related Workmentioning
confidence: 76%
See 4 more Smart Citations

alurity, a toolbox for robot cybersecurity

Mayoral-Vilches,
Abad-Fernández,
Pinzger
et al. 2020
Preprint
“…A similar experience to [12] was described more recently by [18] which targets research in Autonomous Cyber Operations (ACO). The authors of [18] proposed a high-fidelity emulation using VMs, and a low-fidelity simulation using a finite state machine design that could model networks.…”
Section: Related Workmentioning
confidence: 76%
“…A similar experience to [12] was described more recently by [18] which targets research in Autonomous Cyber Operations (ACO). The authors of [18] proposed a high-fidelity emulation using VMs, and a low-fidelity simulation using a finite state machine design that could model networks. Virtualization of the different scenarios was realized by using a description file (YAML) and a flag determined the use of either simulation or emulation.…”
Section: Related Workmentioning
confidence: 76%
See 3 more Smart Citations

alurity, a toolbox for robot cybersecurity

Mayoral-Vilches,
Abad-Fernández,
Pinzger
et al. 2020
Preprint