Next Article in Journal
SD-GASNet: Efficient Dual-Domain Multi-Scale Fusion Network with Self-Distillation for Surface Defect Detection
Previous Article in Journal
Optimizing the Interaction System for Treadmill Video Games Using a Smartphone’s Front Camera
Previous Article in Special Issue
FP-ZOO: Fast Patch-Based Zeroth Order Optimization for Black-Box Adversarial Attacks on Vision Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach

School of Computer Engineering & Applied Mathematics, Hankyong National University, Anseong-si 17579, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2026, 26(1), 21; https://doi.org/10.3390/s26010021
Submission received: 19 November 2025 / Revised: 12 December 2025 / Accepted: 17 December 2025 / Published: 19 December 2025
(This article belongs to the Special Issue Cyber Security and AI—2nd Edition)

Abstract

Conventional machine-learning-based defenses are unable to generalize well to novel chains of ATT&CK actions. Being inefficient with low telemetry budgets, they are also unable to provide causal explainability and auditing. We propose a knowledge-based cyber-defense framework that integrates ATT&CK constrained model generation, budget-constrained reinforcement learning, and graph-based causal explanation into a single auditable pipeline. The framework formalizes the synthesis of zero-day chains of attacks using a grammar-formalized ATT&CK database and compiles them into the Zeek-aligned witness telemetry. This allows for efficient training of detection using the generated data within limited sensor budgets. The Cyber-Threat Knowledge Graph (CTKG) stores dynamically updated inter-relational semantics between tactics, techniques, hosts, and vulnerabilities. This enhances the decision state using causal relations. The sensor budget policy selects the sensoring and containment decisions within explicit bounds of costs and latency. The inherent defense-provenance features enable a traceable explanation of each generated alarm. Extensive evaluations of the framework using the TTP holdouts of the zero-day instances show remarkable improvements over conventional techniques in terms of low-FPR accuracy, TTD, and calibration.
Keywords: Cyber-Threat Knowledge Graph; MITRE ATT& CK; generative cyber range; reinforcement learning for cyber defense; zero-day TTP Cyber-Threat Knowledge Graph; MITRE ATT& CK; generative cyber range; reinforcement learning for cyber defense; zero-day TTP

Share and Cite

MDPI and ACS Style

Basak, M.; Shin, G.-Y. A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. Sensors 2026, 26, 21. https://doi.org/10.3390/s26010021

AMA Style

Basak M, Shin G-Y. A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. Sensors. 2026; 26(1):21. https://doi.org/10.3390/s26010021

Chicago/Turabian Style

Basak, Mainak, and Geon-Yun Shin. 2026. "A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach" Sensors 26, no. 1: 21. https://doi.org/10.3390/s26010021

APA Style

Basak, M., & Shin, G.-Y. (2026). A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. Sensors, 26(1), 21. https://doi.org/10.3390/s26010021

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop