Review of Reinforcement Learning Techniques
The paper with the help of reinforcement learning techniques and its method helps to find the best techniques that can be used in cyber security to help defender protect the data against the attackers. The techniques have been used in a cyber security game and resulted in a game of an unfriendly consecutive decision making problem played between agents i.e. an attacker and a defender.
KeywordsCyber security game Network Agents Standard network Game procedure Reinforcement learning Neural Network
- 2.Chung, K., Kamhoua, C., Kwiat, K., Kalbarczyk, Z., Iyer, K.: Game theory with learning for cyber security monitoring. IEEE HASE, pp. 1–8 (2016)Google Scholar
- 3.Neumann, J.V., Morgenstern, O.: Theory of games and economic behavior. Princeton University Press (2007)Google Scholar
- 5.Garivier, A., Moulines, E.: On upper-confidence bound policies for non-stationary bandit problems. ALT (2008)Google Scholar
- 7.Lin, L.-J.: Reinforcement learning for robots us-ing neural networks. PhD thesis, Carnegie Mellon University (1993)Google Scholar