Have a personal or library account? Click to login
AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing Cover

AHT-QCN: Adaptive Hunt Tuner Algorithm Optimized Q-learning Based Deep Convolutional Neural Network for the Penetration Testing

Open Access
|Sep 2024

References

  1. Ghanem, M. C., T. M. Chen, E. G. Nepomuceno. Hierarchical Reinforcement Learning for Efficient and Effective Automated Penetration Testing of Large Networks. – Journal of Intelligent Information Systems, Vol. 60, 2023, No 2, pp. 281-303.
  2. Wang, Y., Y. Li, X. Xiong, J. Zhang, Q. Yao, C. Shen. DQfD‐AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data. – Security and Communication Networks, 2023, No 1, 5834434.
  3. Li, Z., Q. Zhang, G. Yang. EPPTA: Efficient Partially Observable Reinforcement Learning Agent for Penetration Testing Applications. – Engineering Reports, 2023, e12818.
  4. Yi, J., X. Liu. Deep Reinforcement Learning for Intelligent Penetration Testing Path Design. – Applied Sciences, Vol. 13, 2023, No 16, 9467.
  5. Chen, J., S. Hu, H. Zheng, C. Xing, G. Zhang. GAIL-PT: An Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. – Computers & Security, Vol. 126, 2023, 103055.
  6. Arkin, B., S. Stender, G. McGraw. Software Penetration Testing. – IEEE Security & Privacy, Vol. 3, 2005, No 1, pp. 84-87.
  7. Kaur, G., N. Kaur. Penetration Testing – Reconnaissance with NMAP Tool. – International Journal of Advanced Research in Computer Science, Vol. 8, 2017, No 3, pp. 844-846.
  8. Kaushik, M., G. Ojha. Attack Penetration System for SQL Injection. – International Journal of Advanced Computer Research, Vol. 4, 2014, No 2, p. 724.
  9. Haeni, R. E. Firewall Penetration Testing. – In: Technical Report. The George Washington University Cyberspace Policy Institute, 2033 K St, Suite. Vol. 340. 1997.
  10. Phong, C. T., W. Q. Yan. An Overview of Penetration Testing. – International Journal of Digital Crime and Forensics (IJDCF), Vol. 6, 2014, No 4, pp. 50-74.
  11. Henry, K. Penetration Testing: Protecting Networks and Systems. – IT Governance Publishing, 2012.
  12. Hafiz, A. M. A Survey of Deep q-Networks Used for Reinforcement Learning: State of the Art. – In: Proc. of Intelligent Communication Technologies and Virtual Mobile Networks: (ICICV’22), 2022, pp. 393-402.
  13. Chaudhary, S., A. O’Brien, S. Xu. Automated Post-Breach Penetration Testing through Reinforcement Learning. – In: Proc. of IEEE Conference on Communications and Network Security (CNS’20), 2020, pp. 1-2.
  14. Zennaro, F. M., L. Erdődi. Modelling Penetration Testing with Reinforcement Learning Using Capture‐the‐Flag Challenges: Trade‐Offs between Model‐Free Learning and a Priori Knowledge. – IET Information Security, Vol. 17, 2023, No 3, pp. 441-457.
  15. Chen, X., Y. M. Mu, P. Luo, S. Li, J. Chen. Flow-Based Recurrent Belief State Learning for Pomdps. – In: Proc. of International Conference on Machine Learning (PMLR’22), June 2022, pp. 3444-3468.
  16. CVEdataset, on July 2024. https://www.kaggle.com/datasets/andrewkronser/cve-common-vulnerabilities-and-exposures
  17. Hu, Z., R. Beuran, Y. Tan. Automated Penetration Testing Using Deep Reinforcement Learning. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20), September 2020, pp. 2-10.
  18. Dehghani, M., Z. Montazeri, E. Trojovská, P. Trojovský. Coati Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems. – Knowledge-Based Systems, Vol. 259, 2023, 110011.
  19. Wang, D., D. Tan, L. Liu. Particle Swarm Optimization Algorithm: An Overview. – Soft Computing, Vol. 22, 2018, No 2, pp. 387-408.
  20. Li, J., S. Wang, H. Zhang, A. Zhou. A Multi-Objective Evolutionary Algorithm Based on KNN-Graph for Traffic Network Attack. – Electronics, Vol. 9, 2020, No 10, p. 1589.
  21. Nakhodchi, S. A Framework Based on Bag of Feature and CatBoost for Attack Detection and Attribution in Industrial Control Systems. – Doctoral Dissertation, University of Guelph, 2021.
  22. Xue, W., T. Wu. Active Learning-Based XGBoost for Cyber Physical System against Generic AC False Data Injection Attacks. – IEEE Access, Vol. 8, 2020, pp. 144575-144584.
  23. Huang, S., N. Papernot, I. Goodfellow, Y. Duan, P. Abbeel. Adversarial Attacks on Neural Network Policies. – arXiv preprint arXiv:1702.02284, 2017.
  24. Hossain, M. D., H. Inoue, H. Ochiai, D. Fall, Y. Kadobayashi. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. – IEEE Access, Vol. 8, 2020, pp. 185489-185502.
  25. Marra, F., D. Gragnaniello, L. Verdoliva. On the Vulnerability of Deep Learning to Adversarial Attacks for Camera Model Identification. – Signal Processing: Image Communication, Vol. 65, 2018, pp. 240-248.
  26. Sarker, I. HDeep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. – SN Computer Science, Vol. 2, 2021, No 3, p. 154.
  27. Venkatesh, B., J. Anuradha. A Review of Feature Selection and Its Methods in Cybernetics and Information Technologies. – Cybernetics and Information Technologies, Vol. 19, 2019, No 1, pp. 3-26.
  28. Lazarov, A. D. Mathematical Modelling of Malware Intrusion in Computer Networks. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 29-47.
DOI: https://doi.org/10.2478/cait-2024-0032 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 182 - 196
Submitted on: Aug 5, 2024
Accepted on: Aug 21, 2024
Published on: Sep 19, 2024
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2024 Dipali Railkar, Shubhalaxmi Joshi, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.