{"title":"A Systematic Literature Review on Malicious Use of Reinforcement Learning","authors":"Torstein Meyer, Nektaria Kaloudi, Jingyue Li","doi":"10.1109/EnCyCriS52570.2021.00011","DOIUrl":null,"url":null,"abstract":"Since the inception of reinforcement learning (RL), there has been a growing interest in its application in various complex domains. Although these RL methods offer significant benefits of learning by their own experiences without an accurate system model, RL methods can also be used maliciously. This paper presents a systematic literature review of the state-of-the art RL-based cyberattacks to facilitate and motivate further research to address the potential RL misuse. We reviewed 30 recent primary papers and categorized them into (i) RL for attack planning, (ii) RL for performing intrusions, and (iii) RL for attack optimization. We also proposed an RL-based cyber attacks framework. Our insights on the status and limitations of the existing studies can help motivate related future studies.","PeriodicalId":409275,"journal":{"name":"2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnCyCriS52570.2021.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Since the inception of reinforcement learning (RL), there has been a growing interest in its application in various complex domains. Although these RL methods offer significant benefits of learning by their own experiences without an accurate system model, RL methods can also be used maliciously. This paper presents a systematic literature review of the state-of-the art RL-based cyberattacks to facilitate and motivate further research to address the potential RL misuse. We reviewed 30 recent primary papers and categorized them into (i) RL for attack planning, (ii) RL for performing intrusions, and (iii) RL for attack optimization. We also proposed an RL-based cyber attacks framework. Our insights on the status and limitations of the existing studies can help motivate related future studies.