Skip to content

A curated list of resources dedicated to reinforcement learning applied to cyber security.

License

Notifications You must be signed in to change notification settings

ML-d/awesome-rl-for-cybersecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Awesome Reinforcement Learning for Cyber Security Awesom

A curated list of resources dedicated to reinforcement learning applied to cyber security. Note that the list includes only work that uses reinforcement learning, general machine learning methods applied to cyber security are not included in this list.

For other related curated lists, see :

Table of Contents

Environments

gym-idsgame

gym-idsgame

CyberBattleSim (Microsoft)

CyberBattleSim
  • CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network environment. The simulation provides a high-level abstraction of computer networks and cyber security concepts. Its Python-based Open AI Gym interface allows for the training of automated agents using reinforcement learning algorithms. Blogpost: (2021) Gamifying machine learning for stronger security and AI models

gym-malware

gym-malware

malware-rl

malware-rl

gym-flipit

gym-flipit

gym-threat-defense

gym-threat-defense

gym-nasim

gym-nasim

gym-optimal-intrusion-response

gym-optimal-intrusion-response

sql_env

sql_env

cage-challenge

cage-challenge-1
  • The first Cyber Autonomos Gym for Experimentation (CAGE) challenge environment released at the 1st International Workshop on Adaptive Cyber Defense held as part of the 2021 International Joint Conference on Artificial Intelligence (IJCAI).
cage-challenge-2
  • The second Cyber Autonomous Gym for Experimentation (CAGE) challenge environment announced at the AAAI-22 Workshop on Artificial Intelligence for Cyber Security Workshop (AICS).
cage-challenge-3
  • The third Cyber Autonomous Gym for Experimentation (CAGE) challenge environment.

ATMoS

ATMoS

MAB-Malware

MAB-malware

ASAP

Autonomous Security Analysis and Penetration Testing framework (ASAP)

Yawning Titan

Yawning Titan

Cyborg

  • (2020) ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
  • (2020) Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges: Trade-offs between Model-free Learning and A Priori Knowledge
  • (2020) Finding Effective Security Strategies through Reinforcement Learning and Self-Play
  • (2020) AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET
  • (2020) Reinforcement Learning for Efficient Network Penetration Testing
  • (2020) The Agent Web Model -- Modelling web hacking for reinforcement learning
  • (2020) Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats
  • (2020) Reinforcement Learning Based PHY Authentication for VANETs
  • (2020) Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems
  • (2020) Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
  • (2020) Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
  • (2020) Distributed Reinforcement Learning for Cyber-Physical System With Multiple Remote State Estimation Under DoS Attacker
  • (2020) Secure Crowdsensing in 5G Internet of Vehicles: When Deep Reinforcement Learning Meets Blockchain
  • (2020) Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure
  • (2020) Application of deep reinforcement learning to intrusion detection for supervised problems
  • (2019) A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
  • (2019) Deep Q-Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks
  • (2019) Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
  • (2019) Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control
  • (2019) Study of Learning of Power Grid Defense Strategy in Adversarial Stage Game
  • (2019) Learning to Cope with Adversarial Attacks
  • (2019) Learning Distributed Cooperative Policies for Security Games via Deep Reinforcement Learning
  • (2019) An Efficient Reinforcement Learning-Based Botnet Detection approach
  • (2019) Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense
  • (2019) QFlip: An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game
  • (2019) Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning
  • (2019) Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes
  • (2019) Detecting Phishing Websites through Deep Reinforcement Learning
  • (2019) Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense
  • (2019) Autonomous Penetration Testing using Reinforcement Learning
  • (2019) A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution
  • (2019) Automating Penetration Testing using Reinforcement Learning
  • (2019) Reinforcement Learning-Based DoS Mitigation in Software Defined Networks
  • (2019) Adversarial attack and defense in reinforcement learning-from AI security view
  • (2019) A Learning-Based Solution for an Adversarial Repeated Game in Cyber–Physical Power Systems
  • (2019) Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection
  • (2019) Cyber-Attack Recovery Strategy for Smart Grid Based on Deep Reinforcement Learning
  • (2019) Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems
  • (2018) Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents
  • (2018) Security in Mobile Edge Caching with Reinforcement Learning
  • (2018) Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
  • (2018) A reinforcement learning approach for attack graph analysis
  • (2018) Reinforcement Learning for Autonomous Defence in Software-Defined Networking
  • (2018) Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning
  • (2018) Autonomic Computer Network Defence Using Risk State and Reinforcement Learning
  • (2018) Reinforcement Learning for Intelligent Penetration Testing
  • (2018) Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture
  • (2018) Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack
  • (2018) Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks
  • (2018) Machine learning for autonomous cyber defense
  • (2018) Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach
  • (2018) Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks
  • (2018) UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning
  • (2018) A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
  • (2018) Security in Mobile Edge Caching with Reinforcement Learning
  • (2018) Robotics CTF (RCTF), a playground for robot hacking
  • (2018) An IRL Approach for Cyber-Physical Attack Intention Prediction and Recovery
  • (2018) QRASSH - A Self-Adaptive SSH Honeypot Driven by Q-Learning
  • (2018) Using Reinforcement Learning to Conceal Honeypot Functionality
  • (2018) Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware
  • (2018) Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning
  • (2017) Network Defense Strategy Selection with Reinforcement Learning and Pareto Optimization
  • (2017) Adversarial Reinforcement Learning in a Cyber Security Simulation
  • (2017) Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning
  • (2017) Q-learning Based Vulnerability Analysis of Smart Grid against Sequential Topology Attacks
  • (2017) Multi-agent Reinforcement Learning Based Cognitive Anti-jamming
  • (2017) Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection
  • (2017) A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning
  • (2017) Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs
  • (2016) Markov Security Games: Learning in Spatial Security Problems
  • (2016) Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning
  • (2016) Balancing Security and Performance for Agility in Dynamic Threat Environments
  • (2016) Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios
  • (2016) PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
  • (2015) Application of reinforcement learning for security enhancement incognitive radio networks
  • (2015) Power control with reinforcement learning in cooperative cognitive radio networks against jamming
  • (2015) Game Theory with Learning for Cyber Security Monitoring
  • (2015) Spoofing Detection with Reinforcement Learning in Wireless Networks
  • (2015) Mobile Cloud Offloading for Malware Detections with Learning
  • (2014) Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed
  • (2014) Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
  • (2014) Q-Learning: From Computer Network Security to Software Security
  • (2013) Multiagent Router Throttling: Decentralized Coordinated Response Against DDoS Attacks
  • (2013) Hybrid Learning in Stochastic Games and Its Application in Network Security
  • (2013) Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies with Reinforcement Learning
  • (2012) Intrusion Detection System using Log Files and Reinforcement Learning
  • (2012) Anti-jamming in Cognitive Radio Networks Using Reinforcement Learning Algorithms
  • (2011) An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks
  • (2011) Distributed strategic learning with application to network security
  • (2010) Dynamic policy-based IDS configuration
  • (2008) Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
  • (2007) Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning
  • (2006) An intrusion detection game with limited observations
  • (2005) A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls
  • (2005) Multi-agent reinforcement learning for intrusion detection
  • (2000) Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks
  • PhD Theses

    Master Theses

    Bachelor Theses

    Posters

    Books

    Blogposts

    Talks

    Miscellaneous

    Contribute

    Contributions are very welcome. Please use Github issues and pull requests.

    List of Contributors

    License

    LICENSE

    Creative Commons

    (C) 2022

    About

    A curated list of resources dedicated to reinforcement learning applied to cyber security.

    Resources

    License

    Stars

    Watchers

    Forks

    Releases

    No releases published

    Packages

    No packages published