Limmen / csle
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
☆118Updated last month
Related projects ⓘ
Alternatives and complementary repositories for csle
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated last month
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆58Updated 5 months ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆74Updated last year
- ☆51Updated last year
- Cyber Operations Research Gym☆63Updated 5 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆55Updated 6 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆21Updated last year
- An environment for testing AI pentesting agents against a simulated network.☆166Updated 8 months ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆22Updated last month
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆41Updated 3 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆39Updated this week
- TTCP CAGE Challenge 2☆46Updated 5 months ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 6 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 8 months ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- ☆82Updated 2 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆13Updated 3 months ago
- Multi-Agent Reinforcement Learning on network-security☆16Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- A logic-based enterprise network security analyzer☆108Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆41Updated 6 months ago
- Code for shelLM tool☆44Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆116Updated 3 months ago
- TTCP CAGE Challenge 3☆34Updated 7 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆39Updated last month
- Augmentation to Machine Readable CTI☆25Updated last month
- PowerShell Script Analyzer☆65Updated last year