alan-turing-institute / cage-challenge-2-public
Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.
☆13Updated 4 months ago
Alternatives and similar repositories for cage-challenge-2-public:
Users that are interested in cage-challenge-2-public are comparing it to the libraries listed below
- TTCP CAGE Challenge 2☆47Updated 11 months ago
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆34Updated 2 months ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆53Updated 8 months ago
- Cyber Operations Research Gym☆77Updated 10 months ago
- ☆54Updated 2 years ago
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Updated 3 months ago
- TTCP CAGE Challenge 3☆36Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆79Updated 2 months ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆19Updated last month
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆36Updated 7 months ago
- ☆18Updated 3 weeks ago
- ☆20Updated 3 years ago
- ☆10Updated last year
- implementation of the paper "APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Emb…☆11Updated 4 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆32Updated 4 months ago
- An environment for testing AI pentesting agents against a simulated network.☆187Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆12Updated 2 years ago
- Replication Package for "Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets", IEEE S&P 2024.☆28Updated 3 months ago
- ☆11Updated 3 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆26Updated 3 weeks ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- ☆16Updated 2 years ago
- Open source implementation of the TrojDRL algorithm presented in TrojDRL: Evaluation of backdoor attacks on Deep Reinforcement Learning☆18Updated 4 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆841Updated 3 weeks ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆13Updated 9 months ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated 10 months ago
- Search-based Testing Approach of Reinforcement Learning Agent☆11Updated 5 months ago
- ☆9Updated 3 years ago