Open Access

AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing

 and   
Sep 19, 2024

Cite
Download Cover

Ghanem, M. C., T. M. Chen, E. G. Nepomuceno. Hierarchical Reinforcement Learning for Efficient and Effective Automated Penetration Testing of Large Networks. – Journal of Intelligent Information Systems, Vol. 60, 2023, No 2, pp. 281-303. Search in Google Scholar

Wang, Y., Y. Li, X. Xiong, J. Zhang, Q. Yao, C. Shen. DQfD‐AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data. – Security and Communication Networks, 2023, No 1, 5834434. Search in Google Scholar

Li, Z., Q. Zhang, G. Yang. EPPTA: Efficient Partially Observable Reinforcement Learning Agent for Penetration Testing Applications. – Engineering Reports, 2023, e12818. Search in Google Scholar

Yi, J., X. Liu. Deep Reinforcement Learning for Intelligent Penetration Testing Path Design. – Applied Sciences, Vol. 13, 2023, No 16, 9467. Search in Google Scholar

Chen, J., S. Hu, H. Zheng, C. Xing, G. Zhang. GAIL-PT: An Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. – Computers & Security, Vol. 126, 2023, 103055. Search in Google Scholar

Arkin, B., S. Stender, G. McGraw. Software Penetration Testing. – IEEE Security & Privacy, Vol. 3, 2005, No 1, pp. 84-87. Search in Google Scholar

Kaur, G., N. Kaur. Penetration Testing – Reconnaissance with NMAP Tool. – International Journal of Advanced Research in Computer Science, Vol. 8, 2017, No 3, pp. 844-846. Search in Google Scholar

Kaushik, M., G. Ojha. Attack Penetration System for SQL Injection. – International Journal of Advanced Computer Research, Vol. 4, 2014, No 2, p. 724. Search in Google Scholar

Haeni, R. E. Firewall Penetration Testing. – In: Technical Report. The George Washington University Cyberspace Policy Institute, 2033 K St, Suite. Vol. 340. 1997. Search in Google Scholar

Phong, C. T., W. Q. Yan. An Overview of Penetration Testing. – International Journal of Digital Crime and Forensics (IJDCF), Vol. 6, 2014, No 4, pp. 50-74. Search in Google Scholar

Henry, K. Penetration Testing: Protecting Networks and Systems. – IT Governance Publishing, 2012. Search in Google Scholar

Hafiz, A. M. A Survey of Deep q-Networks Used for Reinforcement Learning: State of the Art. – In: Proc. of Intelligent Communication Technologies and Virtual Mobile Networks: (ICICV’22), 2022, pp. 393-402. Search in Google Scholar

Chaudhary, S., A. O’Brien, S. Xu. Automated Post-Breach Penetration Testing through Reinforcement Learning. – In: Proc. of IEEE Conference on Communications and Network Security (CNS’20), 2020, pp. 1-2. Search in Google Scholar

Zennaro, F. M., L. Erdődi. Modelling Penetration Testing with Reinforcement Learning Using Capture‐the‐Flag Challenges: Trade‐Offs between Model‐Free Learning and a Priori Knowledge. – IET Information Security, Vol. 17, 2023, No 3, pp. 441-457. Search in Google Scholar

Chen, X., Y. M. Mu, P. Luo, S. Li, J. Chen. Flow-Based Recurrent Belief State Learning for Pomdps. – In: Proc. of International Conference on Machine Learning (PMLR’22), June 2022, pp. 3444-3468. Search in Google Scholar

CVEdataset, on July 2024. https://www.kaggle.com/datasets/andrewkronser/cve-common-vulnerabilities-and-exposures Search in Google Scholar

Hu, Z., R. Beuran, Y. Tan. Automated Penetration Testing Using Deep Reinforcement Learning. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20), September 2020, pp. 2-10. Search in Google Scholar

Dehghani, M., Z. Montazeri, E. Trojovská, P. Trojovský. Coati Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems. – Knowledge-Based Systems, Vol. 259, 2023, 110011. Search in Google Scholar

Wang, D., D. Tan, L. Liu. Particle Swarm Optimization Algorithm: An Overview. – Soft Computing, Vol. 22, 2018, No 2, pp. 387-408. Search in Google Scholar

Li, J., S. Wang, H. Zhang, A. Zhou. A Multi-Objective Evolutionary Algorithm Based on KNN-Graph for Traffic Network Attack. – Electronics, Vol. 9, 2020, No 10, p. 1589. Search in Google Scholar

Nakhodchi, S. A Framework Based on Bag of Feature and CatBoost for Attack Detection and Attribution in Industrial Control Systems. – Doctoral Dissertation, University of Guelph, 2021. Search in Google Scholar

Xue, W., T. Wu. Active Learning-Based XGBoost for Cyber Physical System against Generic AC False Data Injection Attacks. – IEEE Access, Vol. 8, 2020, pp. 144575-144584. Search in Google Scholar

Huang, S., N. Papernot, I. Goodfellow, Y. Duan, P. Abbeel. Adversarial Attacks on Neural Network Policies. – arXiv preprint arXiv:1702.02284, 2017. Search in Google Scholar

Hossain, M. D., H. Inoue, H. Ochiai, D. Fall, Y. Kadobayashi. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. – IEEE Access, Vol. 8, 2020, pp. 185489-185502. Search in Google Scholar

Marra, F., D. Gragnaniello, L. Verdoliva. On the Vulnerability of Deep Learning to Adversarial Attacks for Camera Model Identification. – Signal Processing: Image Communication, Vol. 65, 2018, pp. 240-248. Search in Google Scholar

Sarker, I. HDeep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. – SN Computer Science, Vol. 2, 2021, No 3, p. 154. Search in Google Scholar

Venkatesh, B., J. Anuradha. A Review of Feature Selection and Its Methods in Cybernetics and Information Technologies. – Cybernetics and Information Technologies, Vol. 19, 2019, No 1, pp. 3-26. Search in Google Scholar

Lazarov, A. D. Mathematical Modelling of Malware Intrusion in Computer Networks. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 29-47. Search in Google Scholar

Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology