FMZennaro / CTF-RL
Modelling Capture-the-Flag Challenges Using Reinforcement Learning
☆15Updated 2 years ago
Related projects: ⓘ
- A Simulated Optimal Intrusion Response Game☆19Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆38Updated last year
- Modelling SQL Injection Using Reinforcement Learning☆18Updated 2 years ago
- ☆19Updated 2 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆20Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 2 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- ☆15Updated last year
- A comprehensive local Linux Privilege-Escalation Benchmark☆20Updated last week
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆22Updated 2 years ago
- Adversarial Malware Generator Using GANs☆49Updated last month
- ☆50Updated last year
- Multi-Agent Reinforcement Learning on network-security☆16Updated 2 years ago
- Cyber Operations Research Gym☆59Updated 3 months ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 4 years ago
- ☆74Updated 4 years ago
- ☆15Updated 2 years ago
- ☆32Updated last month
- ☆11Updated 2 weeks ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆71Updated 5 months ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆20Updated last month
- Malware Classification using Machine learning☆69Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆16Updated last month
- Malware Bypass Research using Reinforcement Learning☆99Updated 4 months ago
- TTCP CAGE Challenge 2☆46Updated 3 months ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 3 years ago
- TTCP CAGE Challenge 3☆34Updated 5 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆31Updated 2 months ago