2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) 2021
DOI: 10.1109/icaica52286.2021.9497911
|View full text |Cite
|
Sign up to set email alerts
|

Ontology and Reinforcement Learning Based Intelligent Agent Automatic Penetration Test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…AI-driven penetration testing tools, which can adjust their strategies based on real-time data, can simulate complex cyber-attack scenarios more dynamically and realistically than traditional methods [120]. Dynamic Penetration Testing [45], [44], [43], [140] Penetration Testing Optimization [103], [57], [64], [30], [178], [142], [71], [78] Penetration Testing in Large-Scale Network [101], [190], [47], [100] Fuzz Testing Fuzz Data Generation [104], [127], [148], [198] Fuzz Testing Performance Improvement…”
Section: Penetration Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…AI-driven penetration testing tools, which can adjust their strategies based on real-time data, can simulate complex cyber-attack scenarios more dynamically and realistically than traditional methods [120]. Dynamic Penetration Testing [45], [44], [43], [140] Penetration Testing Optimization [103], [57], [64], [30], [178], [142], [71], [78] Penetration Testing in Large-Scale Network [101], [190], [47], [100] Fuzz Testing Fuzz Data Generation [104], [127], [148], [198] Fuzz Testing Performance Improvement…”
Section: Penetration Testingmentioning
confidence: 99%
“…This methodology employs the Deep Deterministic Policy Gradient (DDPG) model to enhance the fuzzing process, thereby optimizing the identi cation of software vulnerabilities while adhering e ciently to format constraints (Article [50]). Hybrid frameworks that combine ontologybased cognitive Belief-Desire-Intention (BDI)-agent with RL techniques optimize attack planning and execution, handling dynamic and uncertain environments e ciently (Article [142]). These frameworks utilize a knowledge base derived from expert penetration testers to systematically learn and adapt, improving the overall e cacy of penetration tests.…”
Section: Reinforcementmentioning
confidence: 99%
“…PTassesses information security from the attacker's perspective. Trough PT of companies, organisations, or departments, we understand their information security policies and network vulnerabilities and give possible solutions and remedies to improve network security [14]. As network equipment and defence detection systems continue to upgrade, the complexity of performing the PT process has increased dramatically.…”
Section: Ptand Its Automationmentioning
confidence: 99%
“…. k { } do (7) Sample k transition data with priority from the sum tree (8) a←t * σ, b←(t + 1) * σ, (9) v← generate a random number between a and b (10) Transition τ t and corresponding priority are obtained according to a random number v (11) Compute importance sampling weight for each transition τ t (12) end for (13) Train this batch size of transition and compute the TD error according to the weight (14) Update transition priority according to the TD error ALGORITHM 1: Implements PER with the sum tree structure.…”
Section: Rl Settings For Ptmentioning
confidence: 99%
See 1 more Smart Citation