nickromandini / reinforcement-learning-cybersecurity
Implementation of reinforcement learning algorithms in a cyber security simulation. Autonomous and Adaptive Systems (University of Bologna, Italy) course project.
☆8Updated 4 years ago
Alternatives and similar repositories for reinforcement-learning-cybersecurity:
Users that are interested in reinforcement-learning-cybersecurity are comparing it to the libraries listed below
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- Data and code for TMA 2021 paper "Revisiting IoT Device Identification"☆7Updated 2 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆75Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- A logic-based enterprise network security analyzer☆112Updated 2 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated this week
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 4 months ago
- ☆14Updated 3 years ago
- An environment for testing AI pentesting agents against a simulated network.☆175Updated 11 months ago
- AI-enabled Cybersecurity for Future Smart Environments☆21Updated 5 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆12Updated 9 months ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆24Updated 5 years ago
- ☆18Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆47Updated last year
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆15Updated 2 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆59Updated 8 months ago
- ☆26Updated last year
- Building an Intrusion detection system using KDD Cup 99 Dataset☆12Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago
- ☆52Updated 2 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆116Updated last year
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆22Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆146Updated last year