2022
DOI: 10.1109/tnsm.2022.3158468
|View full text |Cite
|
Sign up to set email alerts
|

DeepAir: Deep Reinforcement Learning for Adaptive Intrusion Response in Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 22 publications
0
28
0
Order By: Relevance
“…Many recent results of automating security strategies have been obtained using reinforcement learning methods. In particular, a large number of studies have focused on intrusion prevention use cases similar to the one we discuss in this paper [13], [14], [26], [27], [19], [25], [28], [20], [29], [21], [22], [24], [83], [84], [85], [23], [86], [33], [35], [34].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Many recent results of automating security strategies have been obtained using reinforcement learning methods. In particular, a large number of studies have focused on intrusion prevention use cases similar to the one we discuss in this paper [13], [14], [26], [27], [19], [25], [28], [20], [29], [21], [22], [24], [83], [84], [85], [23], [86], [33], [35], [34].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
“…These works use a variety of models, including MDPs [19], [20], [21], [22], [23], [35], Markov games [26], [13], [83], [33], attack graphs [34], and POMDPs [14], [24], [25], as well as various reinforcement learning algorithms, including Q-learning [26], [19], [20], [36], SARSA [25], PPO [13], [14], [34], [35], hierarchical reinforcement learning [21], DQN [22], Thompson sampling [24], MuZero [83], NFQ [84], DDQN [23], NFSP [37], and DDPG [85], [33].…”
Section: A Reinforcement Learning In Network Securitymentioning
confidence: 99%
See 3 more Smart Citations