Poster: Generating Experiences for Autonomous Network Defense
Abstract
References
Index Terms
- Poster: Generating Experiences for Autonomous Network Defense
Recommendations
Autonomous Network Defence using Reinforcement Learning
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityIn the network security arms race, the defender is significantly disadvantaged as they need to successfully detect and counter every malicious attack. In contrast, the attacker needs to succeed only once. To level the playing field, we investigate the ...
A network security classifier defense: against adversarial machine learning attacks
WiseML '20: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine LearningThe discovery of practical adversarial machine learning (AML) attacks against machine learning-based wired and wireless network security detectors has driven the necessity of a defense. Without a defense mechanism against AML, attacks in wired and ...
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
AbstractIn today’s intricate information technology landscape, the escalating complexity of computer networks is accompanied by a myriad of malicious threats seeking to compromise network components. To address these security challenges, we propose an ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Weizhi Meng,
- Christian D. Jensen,
- Program Chairs:
- Cas Cremers,
- Engin Kirda
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 166Total Downloads
- Downloads (Last 12 months)166
- Downloads (Last 6 weeks)16
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in