2022
DOI: 10.3390/a15040134
|View full text |Cite
|
Sign up to set email alerts
|

Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security

Abstract: In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, which pose significant challenges to cyber defense decision-making on internal networks. Due to the continuous confrontation between attackers and defenders, only using data-based statistical or supervised learning methods cannot cope with increasingly severe security threats. It is urgent to rethink network defense from the perspective of decision-making, and prepare for every possible situation. Reinforcement le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 100 publications
0
7
0
Order By: Relevance
“…Namely, the authors focused on penetration-testing, design, response, and recovery as different decision-making tasks for cybersecurity. 9 The response and recovery tasks hold particular interest as they encompass many of the tasks a CSOC may perform. During the response task, defenders must have the capability to detect abnormalities and respond appropriately.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Namely, the authors focused on penetration-testing, design, response, and recovery as different decision-making tasks for cybersecurity. 9 The response and recovery tasks hold particular interest as they encompass many of the tasks a CSOC may perform. During the response task, defenders must have the capability to detect abnormalities and respond appropriately.…”
Section: Related Workmentioning
confidence: 99%
“…10 Recovery, meanwhile, typically occurs after response and requires defenders to restore functionality or mitigate residual risk from an event. 9 The associated literature with recovery is fairly limited, with some focusing on recovery of critical power infrastructure. 11,12 Separating these tasks into different decision models may have utility in some scenarios, but doing so may not give cybersecurity professionals optimal workflows to enable holistic network health.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of RL was heavily influenced by how most people acquire new skills, namely, by witnessing the results of repeated attempts at the task at hand. [11]. RL excels in real-time and adversarial settings because of its flexibility and utility in modelling an independent agent to conduct consecutive activities, ideally without or with minimal past knowledge of the atmosphere [12].…”
Section: Introductionmentioning
confidence: 99%
“…This can lead to models that are overfit, meaning they are too narrowly focused on specific attack scenarios and may not generalize well to new or unexpected attack scenarios. In addition to these challenges, there is also a shortage of open-source cybersecurity-based RL experimentation environments that can help researchers address real-world challenges and improve the state of the art in RL cyber applications [ 22 ]. Without access to realistic and scalable experimentation environments, researchers may struggle to develop and test new RL-based approaches to cybersecurity.…”
Section: Introductionmentioning
confidence: 99%