2020
DOI: 10.1016/j.cose.2020.101738
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Cyberattack and Defense Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 50 publications
(38 citation statements)
references
References 7 publications
3
31
0
Order By: Relevance
“…Collectively, this leads to the need to simulate data when dealing with cybersecurity applications. This is explicitly stated in [20] corroborated by [8], [15]- [17], [17], [19], [22], [23]. These abstractions have the objective of portraying several complexities from a real cyber environment and can provide game like environments where RL techniques can be deployed to evaluate defence strategies.…”
Section: Agentmentioning
confidence: 84%
“…Collectively, this leads to the need to simulate data when dealing with cybersecurity applications. This is explicitly stated in [20] corroborated by [8], [15]- [17], [17], [19], [22], [23]. These abstractions have the objective of portraying several complexities from a real cyber environment and can provide game like environments where RL techniques can be deployed to evaluate defence strategies.…”
Section: Agentmentioning
confidence: 84%
“…In contrast, RL does not require large data sets; instead, in RL the data is generated during the learning process in the form of rewards for actions taken, which serve as evaluative feedback to a learning agent [16,17]. RL has increased in importance in recent years because of its applicability in a wide range of disciplines for which identifying all possible examples to train the agent is difficult; those applications include robotics, gaming, computer vision, business, control system engineering, simulation-based optimization, networks, anti-crime operations [18] and cybersecurity [19].…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…The weights and costs of the reward response variables were also the same as for factory layout 1 (see Table 4). Figures 18,19,20,21,22 and 23 show the results of the experiments for the six initial plans; there is one figure for each of the initial plans. As before, in each figure, the x axis represents the number of plan change actions taken and the y axis represents the MH cost of a plan after each action.…”
Section: (Line 15) a Lower Action Valuementioning
confidence: 99%
“…This is due to several reasons. First, it is problematic to identify breaches in companies (Bland et al 2020;Wang and Zhang 2020;Seibold et al 2020;Sahoo and Gupta 2019;Heartfield et al 2018;Choo 2011). Most of the existing research has focused on investigating a certain typology of attacks and on studying cases of companies, without considering a wider spectrum of possible types of attacks that companies may receive (Garre, Pérez, and Ruiz-Martínez 2021;Dahiya and Gupta 2020).…”
Section: Introductionmentioning
confidence: 99%