Limmen / gym-idsgame
An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym
☆70Updated last year
Related projects: ⓘ
- ☆50Updated last year
- A Simulated Optimal Intrusion Response Game☆19Updated 2 years ago
- Cyber Operations Research Gym☆59Updated 3 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆31Updated 2 months ago
- TTCP CAGE Challenge 2☆46Updated 3 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆20Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆34Updated last month
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆115Updated this week
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆20Updated last month
- An environment for testing AI pentesting agents against a simulated network.☆157Updated 6 months ago
- Multi-Agent Reinforcement Learning on network-security☆16Updated 2 years ago
- TTCP CAGE Challenge 3☆34Updated 5 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆12Updated 2 months ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆55Updated 3 months ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆726Updated this week
- ☆15Updated 2 years ago
- ☆9Updated 2 years ago
- PyTorch implementation of the paper "Deep Reinforcement Learning in Large Discrete Action Spaces" (Gabriel Dulac-Arnold, Richard Evans, H…☆65Updated 4 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆76Updated 3 years ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆17Updated 9 months ago
- Implementation of the VIPER algorithm introduced in "Verifiable Reinforcement Learning via Policy Extraction" by Bastani et al.☆12Updated 9 months ago
- ☆10Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- A logic-based enterprise network security analyzer☆105Updated last year
- reinforcement learning with pytorch geometric library☆45Updated 2 years ago
- An open, minimalist Gymnasium environment for autonomous coordination in wireless mobile networks.☆97Updated 5 months ago
- Code for Dynamic Weights in Multi-Objective Deep Reinforcement Learning☆83Updated last year
- Adversarial attacks in consensus-based multi-agent reinforcement learning☆16Updated last year
- Implementation for mSAC methods in PyTorch☆36Updated 2 years ago
- PyTorch implementation of Foerster, Jakob N., et al. "Counterfactual multi-agent policy gradients."☆52Updated 4 years ago