Accès libre

AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing

 et   
19 sept. 2024
À propos de cet article

Citez
Télécharger la couverture

Ghanem, M. C., T. M. Chen, E. G. Nepomuceno. Hierarchical Reinforcement Learning for Efficient and Effective Automated Penetration Testing of Large Networks. – Journal of Intelligent Information Systems, Vol. 60, 2023, No 2, pp. 281-303. Search in Google Scholar

Wang, Y., Y. Li, X. Xiong, J. Zhang, Q. Yao, C. Shen. DQfD‐AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data. – Security and Communication Networks, 2023, No 1, 5834434. Search in Google Scholar

Li, Z., Q. Zhang, G. Yang. EPPTA: Efficient Partially Observable Reinforcement Learning Agent for Penetration Testing Applications. – Engineering Reports, 2023, e12818. Search in Google Scholar

Yi, J., X. Liu. Deep Reinforcement Learning for Intelligent Penetration Testing Path Design. – Applied Sciences, Vol. 13, 2023, No 16, 9467. Search in Google Scholar

Chen, J., S. Hu, H. Zheng, C. Xing, G. Zhang. GAIL-PT: An Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. – Computers & Security, Vol. 126, 2023, 103055. Search in Google Scholar

Arkin, B., S. Stender, G. McGraw. Software Penetration Testing. – IEEE Security & Privacy, Vol. 3, 2005, No 1, pp. 84-87. Search in Google Scholar

Kaur, G., N. Kaur. Penetration Testing – Reconnaissance with NMAP Tool. – International Journal of Advanced Research in Computer Science, Vol. 8, 2017, No 3, pp. 844-846. Search in Google Scholar

Kaushik, M., G. Ojha. Attack Penetration System for SQL Injection. – International Journal of Advanced Computer Research, Vol. 4, 2014, No 2, p. 724. Search in Google Scholar

Haeni, R. E. Firewall Penetration Testing. – In: Technical Report. The George Washington University Cyberspace Policy Institute, 2033 K St, Suite. Vol. 340. 1997. Search in Google Scholar

Phong, C. T., W. Q. Yan. An Overview of Penetration Testing. – International Journal of Digital Crime and Forensics (IJDCF), Vol. 6, 2014, No 4, pp. 50-74. Search in Google Scholar

Henry, K. Penetration Testing: Protecting Networks and Systems. – IT Governance Publishing, 2012. Search in Google Scholar

Hafiz, A. M. A Survey of Deep q-Networks Used for Reinforcement Learning: State of the Art. – In: Proc. of Intelligent Communication Technologies and Virtual Mobile Networks: (ICICV’22), 2022, pp. 393-402. Search in Google Scholar

Chaudhary, S., A. O’Brien, S. Xu. Automated Post-Breach Penetration Testing through Reinforcement Learning. – In: Proc. of IEEE Conference on Communications and Network Security (CNS’20), 2020, pp. 1-2. Search in Google Scholar

Zennaro, F. M., L. Erdődi. Modelling Penetration Testing with Reinforcement Learning Using Capture‐the‐Flag Challenges: Trade‐Offs between Model‐Free Learning and a Priori Knowledge. – IET Information Security, Vol. 17, 2023, No 3, pp. 441-457. Search in Google Scholar

Chen, X., Y. M. Mu, P. Luo, S. Li, J. Chen. Flow-Based Recurrent Belief State Learning for Pomdps. – In: Proc. of International Conference on Machine Learning (PMLR’22), June 2022, pp. 3444-3468. Search in Google Scholar

CVEdataset, on July 2024. https://www.kaggle.com/datasets/andrewkronser/cve-common-vulnerabilities-and-exposures Search in Google Scholar

Hu, Z., R. Beuran, Y. Tan. Automated Penetration Testing Using Deep Reinforcement Learning. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20), September 2020, pp. 2-10. Search in Google Scholar

Dehghani, M., Z. Montazeri, E. Trojovská, P. Trojovský. Coati Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems. – Knowledge-Based Systems, Vol. 259, 2023, 110011. Search in Google Scholar

Wang, D., D. Tan, L. Liu. Particle Swarm Optimization Algorithm: An Overview. – Soft Computing, Vol. 22, 2018, No 2, pp. 387-408. Search in Google Scholar

Li, J., S. Wang, H. Zhang, A. Zhou. A Multi-Objective Evolutionary Algorithm Based on KNN-Graph for Traffic Network Attack. – Electronics, Vol. 9, 2020, No 10, p. 1589. Search in Google Scholar

Nakhodchi, S. A Framework Based on Bag of Feature and CatBoost for Attack Detection and Attribution in Industrial Control Systems. – Doctoral Dissertation, University of Guelph, 2021. Search in Google Scholar

Xue, W., T. Wu. Active Learning-Based XGBoost for Cyber Physical System against Generic AC False Data Injection Attacks. – IEEE Access, Vol. 8, 2020, pp. 144575-144584. Search in Google Scholar

Huang, S., N. Papernot, I. Goodfellow, Y. Duan, P. Abbeel. Adversarial Attacks on Neural Network Policies. – arXiv preprint arXiv:1702.02284, 2017. Search in Google Scholar

Hossain, M. D., H. Inoue, H. Ochiai, D. Fall, Y. Kadobayashi. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. – IEEE Access, Vol. 8, 2020, pp. 185489-185502. Search in Google Scholar

Marra, F., D. Gragnaniello, L. Verdoliva. On the Vulnerability of Deep Learning to Adversarial Attacks for Camera Model Identification. – Signal Processing: Image Communication, Vol. 65, 2018, pp. 240-248. Search in Google Scholar

Sarker, I. HDeep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. – SN Computer Science, Vol. 2, 2021, No 3, p. 154. Search in Google Scholar

Venkatesh, B., J. Anuradha. A Review of Feature Selection and Its Methods in Cybernetics and Information Technologies. – Cybernetics and Information Technologies, Vol. 19, 2019, No 1, pp. 3-26. Search in Google Scholar

Lazarov, A. D. Mathematical Modelling of Malware Intrusion in Computer Networks. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 29-47. Search in Google Scholar

Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Informatique, Informatique