A machine learning approach for smart computer security audit

K Pozdniakov - 2017 - openaccess.city.ac.uk
This thesis presents a novel application of machine learning technology to automate
network security audit and penetration testing processes in particular. A model-free …

Smart security audit: Reinforcement learning with a deep neural network approximator

K Pozdniakov, E Alonso, V Stankovic… - … conference on cyber …, 2020 - ieeexplore.ieee.org
A significant challenge in modern computer security is the growing skill gap as intruder
capabilities increase, making it necessary to begin automating elements of penetration …

Reinforcement learning vs genetic algorithms in game-theoretic cyber-security

S Niculae - 2018 - osf.io
Penetration testing is the practice of performing a simulated attack on a computer system in
order to reveal its vulnerabilities. The most common approach is to gain information and …

[图书][B] Machine Learning Techniques for Cybersecurity

E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim… - 2023 - Springer
The protection of information and information infrastructures from unauthorized access, use,
disclosure, disruption, modification, or destruction is today more critical than ever as they …

Artificial intelligence in computer security: Detection, temporary repair and defense

A Randrianasolo - 2012 - ttu-ir.tdl.org
Computer security system providers are unable to provide timely security updates. Most
security systems are not designed to be adaptive to the increasing number of new threats …

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs

Y Pan, L Cai, T Leng, L Zhao, J Ma, A Yu… - … Conference on Security …, 2022 - Springer
In an enterprise environment, intrusion detection systems generate many threat alerts on
anomalous events every day, and these alerts may involve certain steps of a long-dormant …

Deep hierarchical reinforcement agents for automated penetration testing

K Tran, A Akella, M Standen, J Kim, D Bowman… - arXiv preprint arXiv …, 2021 - arxiv.org
Penetration testing the organised attack of a computer system in order to test existing
defences has been used extensively to evaluate network security. This is a time consuming …

Machine Learning–Enabled Security Parameter Selection to Identify Attacks on the Cloud and Host

R Shankar, P Agrawal, V Madaan - Integration of Cloud Computing with … - taylorfrancis.com
The Internet has become such an important part of people's lives that they can't live without
it. It helps people with business, education, and entertainment, among other things, on …

Game theory with learning for cyber security monitoring

K Chung, CA Kamhoua, KA Kwiat… - 2016 IEEE 17th …, 2016 - ieeexplore.ieee.org
Recent attacks show that threats to cyber infrastructure are not only increasing in volume,
but are getting more sophisticated. The attacks may comprise multiple actions that are hard …

Counteracting security attacks in virtual machines in the cloud using property based attestation

V Varadharajan, U Tupakula - Journal of network and computer …, 2014 - Elsevier
Cloud computing technologies are receiving a great deal of attention. Furthermore most of
the hardware devices such as the PCs and mobile phones are increasingly having a trusted …