Cyborg: A gym for the development of autonomous cyber agents

M Standen, M Lucas, D Bowman, TJ Richer… - arXiv preprint arXiv …, 2021 - arxiv.org
Autonomous Cyber Operations (ACO) involves the development of blue team (defender)
and red team (attacker) decision-making agents in adversarial scenarios. To support the …

Effective defense strategies in network security using improved double dueling deep Q-network

Z Zhu, M Chen, C Zhu, Y Zhu - Computers & Security, 2024 - Elsevier
Network security is a critical discipline in the contemporary digital world, encompassing
diverse technologies and strategies aimed at safeguarding computer systems, networks …

A novel kill-chain framework for remote security log analysis with SIEM software

BD Bryant, H Saiedian - computers & security, 2017 - Elsevier
Network security investigations pose many challenges to security analysts attempting to
identify the root cause of security alarms or incidents. Analysts are often presented with …

Knowledge guided two-player reinforcement learning for cyber attacks and defenses

A Piplai, M Anoruo, K Fasaye, A Joshi… - 2022 21st IEEE …, 2022 - ieeexplore.ieee.org
Cyber defense exercises are an important avenue to understand the technical capacity of
organizations when faced with cyber-threats. Information derived from these exercises often …

Cyborg: An autonomous cyber operations research gym

C Baillie, M Standen, J Schwartz, M Docking… - arXiv preprint arXiv …, 2020 - arxiv.org
Autonomous Cyber Operations (ACO) involves the consideration of blue team (defender)
and red team (attacker) decision-making models in adversarial scenarios. To support the …

Adversarial genetic programming for cyber security: A rising application domain where GP matters

UM O'Reilly, J Toutouh, M Pertierra… - … and Evolvable Machines, 2020 - Springer
Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate
Adversarial Genetic Programming for Cyber Security, a research topic that, by means of …

Adversarial agent-learning for cybersecurity: a comparison of algorithms

A Shashkov, E Hemberg, M Tulla… - The Knowledge …, 2023 - cambridge.org
We investigate artificial intelligence and machine learning methods for optimizing the
adversarial behavior of agents in cybersecurity simulations. Our cybersecurity simulations …

Reward Shaping for Happier Autonomous Cyber Security Agents

E Bates, V Mavroudis, C Hicks - Proceedings of the 16th ACM Workshop …, 2023 - dl.acm.org
As machine learning models become more capable, they have exhibited increased potential
in solving complex tasks. One of the most promising directions uses deep reinforcement …

Investigating coevolutionary archive based genetic algorithms on cyber defense networks

D Garcia, AE Lugo, E Hemberg… - Proceedings of the Genetic …, 2017 - dl.acm.org
We introduce a new cybersecurity project named RIVALS. RIVALS will assist in developing
network defense strategies through modeling adversarial network attack and defense …

A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems

T Islam, I Becker, R Posner, P Ekblom… - … on Dependability in …, 2019 - Springer
The focus on cyber security as an interaction between technical elements and humans has
typically confined consideration of the latter to practical issues of implementation …