gym-optimal-intrusion-response
AI threat response simulator
An environment for training artificial intelligence models to respond optimally to security threats in computer networks
A Simulated Optimal Intrusion Response Game
21 stars
3 watching
6 forks
Language: Python
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A reinforcement learning environment for simulating attack and defense operations in an abstract network intrusion game | 74 |
| A platform for evaluating and developing reinforcement learning agents for cyber security control problems using quantitative methods. | 121 |
| An AI training environment for cyber-defence scenarios | 17 |
| A reinforcement learning environment for simulating energy management in buildings and neighborhoods. | 480 |
| A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
| A framework for training Reinforcement Learning agents in simulated network environments for penetration testing purposes. | 23 |
| A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios | 33 |
| A framework for designing reinforcement learning environments modeling Active Network Management tasks in electricity distribution networks | 143 |
| Standardized framework for creating and sharing incident response processes in a shared language | 151 |
| A collection of resources and guidelines for managing AI incidents, including incident response checklists, regulatory guidance, and technical considerations. | 26 |
| A Gym environment for simulating and optimizing strategies in the FlipIt security game | 3 |
| A PowerShell repository to simulate and train threat hunting skills without malicious files. | 134 |
| Trains neural networks to be provably robust against adversarial examples using abstract interpretation techniques. | 219 |
| Protects AI applications from prompt injection attacks through multiple layers of defense | 1,144 |
| An auditing framework for evaluating AWS account security best practices around incident handling | 55 |