2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162301
|View full text |Cite
|
Sign up to set email alerts
|

Automated Post-Breach Penetration Testing through Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…The shift from manually constructed MDPs [2]- [5] to CVSS-based MDPs [6]- [8] marks an emphasis on scaling the construction of attack-graph-based MDPs. Our methodology maintains an automated, scale-oriented approach to constructing MDPs, while introducing notions of cyber terrain that help ground RL agent behavior to reality.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The shift from manually constructed MDPs [2]- [5] to CVSS-based MDPs [6]- [8] marks an emphasis on scaling the construction of attack-graph-based MDPs. Our methodology maintains an automated, scale-oriented approach to constructing MDPs, while introducing notions of cyber terrain that help ground RL agent behavior to reality.…”
Section: Discussionmentioning
confidence: 99%
“…Paper Network Description(s) Ghanem and Chen [2] 100 machine local area network Schwartz and Kurniawati [3] 50 machines with unknown services and 18 machines with 50 services Ghanem and Chen [4] 100 machine local area network Chaudhary et al [5] Not reported Yousefi et al [6] Attack graph with 44 vertices and 43 edges Chowdary et al [7] Attack graph with 109 vertices, edges unknown, and a 300 host flat network Hu et al [8] Attack graph with 44 vertices and 52 edges Our network…”
Section: Penetration Testingmentioning
confidence: 99%
See 2 more Smart Citations
“…While some authors in RL for penetration testing use alternative methods [2]- [5], CVSS is emerging as a standard approach to modeling MDPs over attack graphs for RL [6]- [10]. Gangupantulu et al draw from the literature to define a vanilla CVSS-MDP for point-to-point network traversal [9].…”
Section: Mdps From Attack Graphsmentioning
confidence: 99%