2023
DOI: 10.1016/j.cose.2022.103055
|View full text |Cite
|
Sign up to set email alerts
|

GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Attackers can make full use of artificial intelligence technologies such as reinforcement learning and imitation learning to make attack decisions and deployment, and then launch high-intensity, high-concealment, and high-destructive cyber attacks with automated and intelligent attack tools. Chen et al [ 19 ] introduce expert knowledge to guide the attack agent to make better decisions in RL-based automated attacks. Li et al [ 20 ] construct an improved network graph model and incorporates social engineering into automated penetration testing (PT) platforms.…”
Section: Related Workmentioning
confidence: 99%
“…Attackers can make full use of artificial intelligence technologies such as reinforcement learning and imitation learning to make attack decisions and deployment, and then launch high-intensity, high-concealment, and high-destructive cyber attacks with automated and intelligent attack tools. Chen et al [ 19 ] introduce expert knowledge to guide the attack agent to make better decisions in RL-based automated attacks. Li et al [ 20 ] construct an improved network graph model and incorporates social engineering into automated penetration testing (PT) platforms.…”
Section: Related Workmentioning
confidence: 99%
“…However, the CTF scenarios constructed for the experiments were only simplifed versions and were not experimented on relatively complex scenarios. Chen [12] frst proposed a generic intelligent PT framework based on GAIL. GAIL-PT addresses the problem of high labour costs due to the intervention of security experts and high-dimensional discrete action spaces.…”
Section: Use Of Expert Knowledgementioning
confidence: 99%
“…. S { } do (10) Sample action A from the behaviour policy (11) Te environment performs A and gives back R(reward), and the agent observes (S, A, R, S′) (12) Push the transition τ(S, A, R, S′) into D interact , overwriting oldest interaction transition if over capacity of D interact (13) Sample a batch size of k transitions from D replay with prioritization (14) Calculate loss J(Q) using the target network (15) Perform a gradient descent step to update the weights for the policy network θ (16) S′←S, the state transitions from S to S′ (17) end for (18) ifumodf f � 0thenθ′←θend if (19) of computer networks and cyber security concepts. We construct a simulated network scene through CBS and encapsulate this network scene into a gym environment where we can interact with an agent and further combine it with RL-related algorithms for our experiments.…”
Section: Main Experimental Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…This dynamic nature of the threat landscape presents a significant challenge to individuals, organizations, and institutions responsible for safeguarding digital assets and sensitive information. Cybercriminals exhibit remarkable adaptability, constantly refining their tactics, techniques, and procedures (TTPs) to stay one step ahead of security measures [5]. Just as security professionals identify and mitigate one vulnerability cybercriminals quickly shift their focus to discover new avenues of attack [6][7].…”
Section: Introductionmentioning
confidence: 99%