skip to main content
10.1145/3067695.3089234acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

Developing proactive defenses for computer networks with coevolutionary genetic algorithms

Published:15 July 2017Publication History

ABSTRACT

Our cybersecurity tool, RIVALS, develops adaptive network defense strategies by modeling adversarial network attack and defense behavior in peer-to-peer networks via coevolutionary algorithms. Currently RIVALS DOS attacks are modestly modeled by the selection of a node that is completely disabled for a resource-limited duration. Defenders have three different network routing protocols. Attack or mission completion and resource cost metrics serve as attacker and defender objectives. This work also includes a description of RIVALS' suite of coevolutionary algorithms that explore archiving as a means of maintaining progressive exploration and support the evaluation of different solution concepts. To compare and contrast the effectiveness of each algorithm, we execute simulations on 3 different network topologies. Our experiments show that it is possible to forgo the assurance of monotonically increasing results and still retain high quality results.

References

  1. Erik Hemberg, Jacob Rosen, Geoff Warner, Sanith Wijesinghe, and Una-May OfiReilly. 2016. Detecting tax evasion: a co-evolutionary approach. Artificial Intelligence and Law 24, 2 (2016), 149--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Elena Popovici, Anthony Bucci, R Paul Wiegand, and Edwin D De Jong. 2012. Coevolutionary principles. In Handbook of Natural Computing. Springer, 987--1033.Google ScholarGoogle Scholar
  3. Ion Stoica, Robert Morris, David Karger, M Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review 31, 4 (2001), 149--160. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Developing proactive defenses for computer networks with coevolutionary genetic algorithms

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            GECCO '17: Proceedings of the Genetic and Evolutionary Computation Conference Companion
            July 2017
            1934 pages
            ISBN:9781450349390
            DOI:10.1145/3067695

            Copyright © 2017 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 July 2017

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            Overall Acceptance Rate1,669of4,410submissions,38%

            Upcoming Conference

            GECCO '24
            Genetic and Evolutionary Computation Conference
            July 14 - 18, 2024
            Melbourne , VIC , Australia

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader