Abstract
Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of their engagements. Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters. Additionally, it prompts research questions around evolving complex behavior by expressing different abstractions with GP and opportunities to reconnect to the machine learning, artificial life, agent-based modeling and cyber security communities. We present a framework called RIVALS which supports the study of network security arms races. Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them.
Similar content being viewed by others
Notes
Computational cost is shown for two populations.
References
H.A. Abbass, The art of red teaming, in Computational Red Teaming, ed. by H.A. Abbass (Springer, Berlin, 2015), pp. 1–45
S. Achleitner, T. Laporta, P. McDaniel, Cyber deception: virtual networks to defend insider reconnaissance, in Proceedings of the 2016 International Workshop on Managing Insider Security Threats (2016), pp. 57–68
K. Adamopoulos, M. Harman, R.M. Hierons, How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution, in Genetic and Evolutionary Computation—GECCO 2004 (Springer 2004), pp. 1338–1349
Akamai, Akamai’s State of the Internet/Security Report—Q1 2017 report. Technical report, Akamai Technologies, Inc. (2017). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q1-2017-state-of-the-internet-security-report.pdf
Akamai, Akamai’s State of the Internet/Security Report—Q3 2017 report. Technical report, Akamai Technologies, Inc. (2017). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q3-2017-state-of-the-internet-security-report.pdf
Akamai Technologies, State of the internet quarterly security reports (2017). https://www.akamai.com/us/en/about/our-thinking/state-of-the-internet-report/global-state-of-the-internet-security-ddos-attack-reports.jsp
J.C. Alex, Behavior trees for next-gen game AI, in Game Developers Conference, Lyon, France (2007), pp. 3–4
S. Anand, E.K. Burke, T.Y. Chen, J. Clark, M.B. Cohen, W. Grieskamp, M. Harman, M.J. Harrold, P. McMinn et al., An orchestrated survey of methodologies for automated software test case generation. J. Syst. Softw. 86(8), 1978–2001 (2013)
P.J. Angeline, J.B. Pollack, Competitive environments evolve better solutions for complex tasks, in Proceedings of the Fifth International Conference (GA93), Genetic Algorithms (1993), pp. 264–270
M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis, et al., Understanding the mirai botnet, in 26th USENIX Security Symposium (USENIX Security 17) (2017), pp. 1093–1110
L.M. Antonio, C.A.C. Coello, Coevolutionary multi-objective evolutionary algorithms: a survey of the state-of-the-art. IEEE Trans. Evolut. Comput. (2018). https://doi.org/10.1109/TEVC.2017.2767023
C. Applegate, C. Elsaesser, J. Sanborn, An architecture for adversarial planning. IEEE Trans. Syst. Man Cybern. 20(1), 186–194 (1990)
A. Arcuri, X. Yao, Coevolving programs and unit tests from their specification, in Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering, ACM (2007), pp. 397–400
A. Arcuri, X. Yao, Co-evolutionary automatic programming for software development. Inf. Sci. 259, 412–432 (2014)
R. Axelrod, The Evolution of Cooperation, vol. 10 (Basic Books, New York, 1984)
R. Axelrod et al., The evolution of strategies in the iterated prisoner’s Dilemma, in The Dynamics of Norms, ed. by C. Bicchieri, R. Jeffrey, B. Skyrms (Cambridge University Press, Cambridge, 1987), pp. 1–16
A.G. Bari, A. Gaspar, R.P. Wiegand, A. Bucci, Selection methods to relax strict acceptance condition in test-based coevolution, in 2018 IEEE Congress on Evolutionary Computation (CEC) (IEEE, 2018), pp. 1–8
E. Barr, M. Harman, P. McMinn, M. Shahbaz, S.I. Yoo, The oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. 41, 507–525 (2015)
D. Beard, Enhancing Automated Red Teaming with Monte Carlo Tree Search (2011)
B. Biggio, F. Roli, Wild patterns: ten years after the rise of adversarial machine learning. ArXiv preprint arXiv:1712.03141 (2017)
D. Bodeau, R. Graubart, Characterizing Effects on the Cyber Adversary: A Vocabulary for Analysis and Assessment (The MITRE Corporation, Bedford, MA, 2013)
J.C. Bongard, H. Lipson, Nonlinear system identification using coevolution of models and tests. IEEE Trans. Evol. Comput. 9(4), 361–384 (2005)
R. Boyd, Mistakes allow evolutionary stability in the repeated prisoner’s Dilemma game. J. Theor. Biol. 136(1), 47–56 (1989)
Brian Krebs, Akamai on the Record KrebsOnSecurity Attack. https://krebsonsecurity.com/2016/11/akamai-on-the-record-krebsonsecurity-attack/ (2016). Accessed October 10, 2018
R. Bronfman-Nadas, N. Zincir-Heywood, J.T. Jacobs, An artificial arms race: could it improve mobile malware detectors? in 2018 Network Traffic Measurement and Analysis Conference (TMA) (IEEE, 2018), pp. 1–8
A. Bucci, Emergent geometric organization and informative dimensions in coevolutionary algorithms, Ph.D. thesis, Brandeis University (2007)
A.B. Cardona, J. Togelius, M.J. Nelson, Competitive coevolution in MS, Pac-Man, in 2013 IEEE Congress on Evolutionary Computation (2013), pp. 1403–1410
J. Cartlidge, S. Bullock, Combating coevolutionary disengagement by reducing parasite virulence. Evol. Comput. 12(2), 193–222 (2004)
M. Castellani, Competitive co-evolution of multi-layer perceptron classifiers. Soft. Comput. 22(10), 3417–3432 (2018)
K. Chellapilla, D.B. Fogel, Evolution, neural networks, games, and intelligence. Proc. IEEE 87(9), 1471–1496 (1999)
R. Colbaugh, K. Glass, Proactive defense for evolving cyber threats, in 2011 IEEE International Conference on Intelligence and Security Informatics (ISI) (IEEE, 2011), pp. 125–130
R. Colbaugh, K. Glass, Predictive defense against evolving adversaries, in 2012 IEEE International Conference on Intelligence and Security Informatics (ISI) (IEEE, 2012), pp. 18–23
R. Colbaugh, K. Glass, Moving target defense for adaptive adversaries, in 2013 IEEE International Conference on Intelligence and Security Informatics (ISI) (IEEE, 2013), pp. 50–55
Crandall, J.R., Ensafi, R., Forrest, S., Ladau, J., Shebaro, B.: The ecology of malware, in Proceedings of the 2008 workshop on New Security Paradigms (ACM, 2009), pp. 99–106
R. Crawford-Marks, L. Spector, J. Klein, Virtual witches and warlocks: a quidditch simulator and quidditch-playing teams coevolved via genetic programming, in Late-Breaking Papers of GECCO-2004, the Genetic and Evolutionary Computation Conference. Published by the International Society for Genetic and Evolutionary Computation (2004)
N. Dalvi, P. Domingos, S. Sanghai, D. Verma, et al. Adversarial classification, in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (ACM, 2004), pp. 99–108
DARPA, The World’s first all-machine hacking tournament. http://archive.darpa.mil/cybergrandchallenge/ (2016). Accessed October 10, 2018
M.A. DeLoura, Game Programming Gems, vol. 2 (Cengage Learning, Boston, 2001)
R. DeMilli et al., Constraint-based automatic test data generation. IEEE Trans. Softw. Eng. 17(9), 900–910 (1991)
P.R. Ehrlich, P.H. Raven, Butterflies and plants: a study in coevolution. Evolution 18(4), 586–608 (1964)
D. Evans, A. Nguyen-Tuong, J. Knight, Effectiveness of moving target defenses, in Moving Target Defense, ed. by S. Jajodia, A. Ghosh, V. Swarup, C. Wang, X. Wang (Springer, Berlin, 2011), pp. 29–48
S.G. Ficici, Solution concepts in coevolutionary algorithms. Ph.D. thesis, Brandeis University (2004)
Flickr, Fireflies brighter (2014). https://www.flickr.com/photos/antoniseb/14325795079/in/gallery-flickr-72157645552049011flickr. Picture taken by Jay Cross—License: CC-BY-SA-2.0
D. Fogel, Blondie24: Playing at the Edge of Artificial Intelligence (Elsevier, Amsterdam, 2001)
R. Ford, M. Bush, A. Bulatov, Predation and the cost of replication: New approaches to malware prevention? Comput. Secur. 25(4), 257–264 (2006)
S. Forrest, S.A. Hofmeyr, A. Somayaji, T.A. Longstaff, A sense of self for unix processes, in Proceedings 1996 IEEE Symposium on Security and Privacy (IEEE, 1996), pp. 120–128
O.L. Fraser, N. Zincir-Heywood, M. Heywood, J.T. Jacobs, Return-oriented programme evolution with roper: a proof of concept, in Proceedings of the Genetic and Evolutionary Computation Conference Companion (ACM, 2017), pp. 1447–1454
D. Garcia, A.E. Lugo, E. Hemberg, U.M. O’Reilly, Investigating coevolutionary archive based genetic algorithms on cyber defense networks, in Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO ’17 (ACM, New York, NY, USA, 2017), pp. 1455–1462
S. Garcia, M. Grill, J. Stiborek, A. Zunino, An empirical comparison of botnet detection methods. Comput. Secur. 45, 100–123 (2014)
P. Godefroid, N. Klarlund, K. Sen, Dart: directed automated random testing, in ACM Sigplan Notices, vol. 40, pp. 213–223. ACM (2005)
D.E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, 1st edn. (Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1989)
I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples. ArXiv preprint arXiv:1412.6572 (2014)
A. Gupta, P. Kuppili, A. Akella, P. Barford, An empirical study of malware evolution, in Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International (IEEE, 2009), pp. 1–10
K.V. Hanford, Automatic generation of test cases. IBM Syst. J. 9(4), 242–257 (1970)
R. Harper, Evolving robocode tanks for evo robocode. Genet. Progr. Evol. Mach. 15(4), 403–431 (2014)
E. Hemberg, J.R. Zipkin, R.W. Skowyra, N. Wagner, U.M. O’Reilly, Adversarial co-evolution of attack and defense in a segmented computer network environment, in Proceedings of the Genetic and Evolutionary Computation Conference Companion (ACM, 2018), pp. 1648–1655
P. Hingston, M. Preuss, Red teaming with coevolution, in 2011 IEEE Congress on Evolutionary Computation (CEC) (2011), pp. 1155–1163. https://doi.org/10.1109/CEC.2011.5949747
G.S. Hornby, B. Mirtich, Diffuse versus true coevolution in a physics-based world, in Proceedings of the 1st Annual Conference on Genetic and Evolutionary Computation, Vol. 2 (Morgan Kaufmann Publishers Inc., 1999), pp. 1305–1312
L. Huang, A.D. Joseph, B. Nelson, B.I. Rubinstein, J. Tygar, Adversarial machine learning, in Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence (ACM, 2011), pp. 43–58
D. Iliopoulos, C. Adami, P. Szor, Darwin inside the machines: malware evolution and the consequences for computer security. ArXiv preprint arXiv:1111.2503 (2011)
H.G. Kayacık, Can the best defense be a good offense? Evolving (MIMICRY) attacks for detector vulnerability testing under a ‘black-box’ assumption. Ph.D. thesis, Dalhousie University, Halifax (2009)
H.G. Kayacık, A.N. Zincir-Heywood, M.I. Heywood, Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Appl. Soft Comput. 11(7), 4366–4383 (2011)
D. Keaveney, C. O’Riordan, Evolving coordination for real-time strategy games. IEEE Trans. Comput. Intell. AI Games 3(2), 155–167 (2011)
R. Kewley, M. Embrechts, Computational military tactical planning system. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 32(2), 161–171 (2002). https://doi.org/10.1109/TSMCC.2002.801352
S. Khanchi, A. Vahdat, M.I. Heywood, A.N. Zincir-Heywood, On botnet detection with genetic programming under streaming data label budgets and class imbalance. Swarm Evolut. Comput. 39, 123–140 (2018)
H.S. Kim, S.B. Cho, An efficient genetic algorithm with less fitness evaluation by clustering, in Proceedings of the 2001 Congress on Evolutionary Computation, pp. 887–894 (2001)
K.E. Kinnear, W.B. Langdon, L. Spector, P.J. Angeline, U.M. O’Reilly, Advances in Genetic Programming, vol. 3 (MIT Press, Cambridge, 1999)
K. Kirkpatrick, Software-defined networking. Commun. ACM 56(9), 16–19 (2013)
J.R. Koza, Genetic Programming II, Automatic Discovery of Reusable Subprograms (MIT Press, Cambridge, MA, 1992)
K. Krawiec, M. Heywood, Solving complex problems with coevolutionary algorithms, in Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion (ACM, 2016), pp. 687–713
K. Krawiec, M.G. Szubert, Learning n-tuple networks for othello by coevolutionary gradient search, in Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation, GECCO ’11 (ACM, 2011) pp. 355–362
R. Lara-Cabrera, C. Cotta, A.J. Fernández-Leiva, A review of computational intelligence in RTS games, in 2013 IEEE Symposium on Foundations of Computational Intelligence (FOCI) (2013), pp. 114–121
P. LaRoche, N. Zincir-Heywood, M.I. Heywood, Evolving TCP/IP packets: a case study of port scans, in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE, 2009), pp. 1–8
C. Le Goues, A. Nguyen-Tuong, H. Chen, J.W. Davidson, S. Forrest, J.D. Hiser, J.C. Knight, M. Van Gundy, Moving target defenses in the helix self-regenerative architecture, in Moving Target Defense II, ed. by S. Jajodia, A.K. Ghosh, V.S. Subrahmanian, V. Swarup, C. Wang, X.S. Wang (Springer, Berlin, 2013), pp. 117–149
M. Lemczyk, M.I. Heywood, Training binary GP classifiers efficiently: a pareto-coevolutionary approach, in European Conference on Genetic Programming (Springer, 2007), pp. 229–240
C.U. Lim, R. Baumgarten, S. Colton, Evolving behaviour trees for the commercial game DEFCON, in European Conference on the Applications of Evolutionary Computation (Springer, 2010), pp. 100–110
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, K. Das, The 1999 Darpa off-line intrusion detection evaluation. Comput. Netw. 34(4), 579–595 (2000)
P. Liskowski, K. Krawiec, Non-negative matrix factorization for unsupervised derivation of search objectives in genetic programming, in Proceedings of the 2016 on Genetic and Evolutionary Computation Conference (ACM, 2016), pp. 749–756
P. Liskowski, K. Krawiec, Online discovery of search objectives for test-based problems. Evol. Comput. 25(3), 375–406 (2017)
D. Lowd, C. Meek, Adversarial learning, in Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (ACM, 2005), pp. 641–647
S. Luke et al., Genetic programming produced competitive soccer softbot teams for robocup97. Genet. Program. 1998, 214–222 (1998)
G. Lyon, Nmap network scanner. https://nmap.org/ (2018). Accessed July 6, 2018
C.M. Macal, M.J. North, Tutorial on agent-based modelling and simulation. J. Simul. 4(3), 151–162 (2010)
M.V. Mahoney, P.K. Chan, An analysis of the 1999 Darpa/Lincoln laboratory evaluation data for network anomaly detection, in Recent Advances in Intrusion Detection, ed. by G. Vigna, C. Kruegel, E. Jonsson (Springer, Berlin, 2003), pp. 220–237
W. Mazurczyk, S. Drobniak, S. Moore, Towards a systematic view on cybersecurity ecology. ArXiv preprint arXiv:1505.04207 (2015)
M.L. McDonald, S.C. Upton, Investigating the dynamics of competition: coevolving red and blue simulation parameters, in Proceedings of the 37th Conference on Winter Simulation, pp. 1008–1012 (2005)
N. Milano, J.T. Carvalho, S. Nolfi, Moderate environmental variation across generations promotes the evolution of robust solutions. Artif. Life 24(4), 277–295 (2019)
C. Miles, J. Quiroz, R. Leigh, S.J. Louis, Co-evolving influence map tree based strategy game players, in IEEE Symposium on Computational Intelligence and Games, 2007. CIG 2007 (IEEE, 2007), pp. 88–95
M. Mitchell, Coevolutionary learning with spatially distributed populations, in Computational Intelligence: Principles and Practice, ed. by G.Y. Yen, D.B. Fogel (Springer, Berlin, 2006)
N. Moran, J. Pollack, Effects of cooperative and competitive coevolution on complexity in a linguistic prediction game, in Artificial Life Conference Proceedings, Vol. 14 (MIT Press, Cambridge, 2017), pp. 298–205
D.J. Musliner, S.E. Friedman, J.M. Rye, T. Marble, Meta-control for adaptive cybersecurity in fuzzbuster, in 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (IEEE, 2013), pp. 219–226
D.J. Musliner, S.E. Friedman, J.M. Rye: Automated fault analysis and filter generation for adaptive cybersecurity, in Proceedings of the 6th International Conference on Adaptive and Self-Adaptive Systems and Applications (2014)
A.B. Nettles, The president has no clothes: the case for broader application of red teaming within homeland security. Technical report, DTIC Document (2010)
M. Nicolau, D. Perez-Liebana, M. O’Neill, A. Brabazon, Evolutionary behavior tree approaches for navigating platform games. IEEE Trans. Comput. Intell. AI Games 9(3), 227–238 (2017)
M. Nogueira-Collazo, C.C. Porras, A.J. Fernández-Leiva, Competitive algorithms for coevolving both game content and AI. A case study: planet wars. IEEE Trans. Comput. Intell. AI Games 8(4), 325–337 (2016)
H. Okhravi, T. Hobson, D. Bigelow, W. Streilein, Finding focus in the blur of moving-target techniques. Secur. Priv. IEEE 12(2), 16–26 (2014). https://doi.org/10.1109/MSP.2013.137
A.A.L. de Oliveira, C.G. Camilo-Junior, A.M.R. Vincenzi, A coevolutionary algorithm to automatic test case selection and mutant in mutation testing, in 2013 IEEE Congress on Evolutionary Computation (2013), pp. 829–836
B. Olsson, Co-evolutionary search in asymmetric spaces. Inf. Sci. 133(3–4), 103–125 (2001)
M. O’Neill, C. Ryan, Grammatical Evolution: Evolutionary Automatic Programming in an Arbitrary Language, vol. 4 (Springer, Berlin, 2003)
U.M. O’Reilly, P.J. Angeline, Introduction to the special issue: Trends in evolutionary methods for program induction. Evol. Comput. 5(2), v–ix (1997)
U.M. O’Reilly, H. Erik, An artificial coevolutionary framework for adversarial AI, in Adversary-Aware Learning Techniques and Trends in Cybersecurity, AAAI Fall Symposium (2018)
M. Ostaszewski, F. Seredynski, P. Bouvry, Coevolutionary-based mechanisms for network anomaly detection. J. Math. Modell. Algorithms 6(3), 411–431 (2007)
D. Perez, M. Nicolau, M. O’Neill, A. Brabazon, Evolving behaviour trees for the Mario AI competition using grammatical evolution, in European Conference on the Applications of Evolutionary Computation (Springer, 2011), pp. 123–132
M. Pertierra, Investigating coevolutionary algorithms for expensive fitness evaluations in cybersecurity. Master’s thesis, Massachusetts Institute of Technology (2018)
A. Petrlic, Circular economy: a coevolutionary perspective on diversity. uwf UmweltWirtschaftsForum 24(2), 253–260 (2016)
J.B. Pollack, A.D. Blair, Co-evolution in the successful learning of backgammon strategy. Mach. Learn. 32(3), 225–240 (1998)
E. Popovici, Bridging supervised learning and test-based co-optimization. J. Mach. Learn. Res. 18(38), 1–39 (2017)
E. Popovici, A. Bucci, R.P. Wiegand, E.D. De Jong, Coevolutionary Principles (Springer, Berlin, 2012), pp. 987–1033
E. Popovici, A. Bucci, R.P. Wiegand, E.D. De Jong, Coevolutionary principles, in Handbook of Natural Computing, ed. by G. Rozenberg, T. Back, J.N. Kok (Springer, Berlin, 2012), pp. 987–1033
E. Popovici, E. Winston, A framework for co-optimization algorithm performance and its application to worst-case optimization. Theor. Comput. Sci. 567, 46–73 (2015)
D. Prado Sanchez, Visualizing adversaries—transparent pooling approaches for decision support in cybersecurity. Master’s thesis, Massachusetts Institute of Technology (2018)
C.D. Rosin, R.K. Belew, New methods for competitive coevolution. Evol. Comput. 5(1), 1–29 (1997)
G. Rush, D.R. Tauritz, A.D. Kent, Coevolutionary agent-based network defense lightweight event system (CANDLES), in Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference (ACM, 2015), pp. 859–866
R.D. Sagarin, T. Taylor, Natural security: how biological systems use information to adapt in an unpredictable world. Secur. Inform. 1(1), 14 (2012)
D.P. Sanchez, M.A. Pertierra, E. Hemberg, U.M. O’Reilly, Competitive coevolutionary algorithm decision support, in Proceedings of the Genetic and Evolutionary Computation Conference Companion (ACM, 2018), pp. 300–301
J. Schmiedlechner, A. Al-Dujaili, E. Hemberg, U.M. O’Reilly, Towards distributed coevolutionary gans. ArXiv preprint arXiv:1807.08194 (2018)
K. Scott, J. Davidson, Strata: a software dynamic translation infrastructure, in IEEE Workshop on Binary Translation (2001)
Scott Hilton: Dyn Analysis Summary of Friday October 21 Attack. https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (2016). Accessed October 10, 2018
T. Service, D. Tauritz, Increasing infrastructure resilience through competitive coevolution. New Math. Nat. Comput. 5(02), 441–457 (2009)
K. Sims, Evolving 3d morphology and behavior by competition. Artif. Life 1(4), 353–372 (1994)
M. Sipper, Evolved to Win. Lulu.com (2011)
M. Sipper, Y. Azaria, A. Hauptman, Y. Shichel, Designing an evolutionary strategizing machine for game playing and beyond. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 37(4), 583–593 (2007)
R.E. Smith, Co-adaptive genetic algorithms: an example in othello strategy, in Proceedings of the Florida Artificial Intelligence Research Symposium, 1994 (1994)
R.J. Smith, M.I. Heywood, Coevolving deep hierarchies of programs to solve complex tasks, in Proceedings of the Genetic and Evolutionary Computation Conference (ACM, 2017), pp. 1009–1016
Son of Boss: Son of boss—Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Son_of_Boss (2018). Accessed October 10, 2018
D. Song, M.I. Heywood, A.N. Zincir-Heywood, Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans. Evol. Comput. 9(3), 225–239 (2005)
A. Sood, R. Enbody, Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur. Priv. 11(1), 54–61 (2013)
K.O. Stanley, B.D. Bryant, R. Miikkulainen, Real-time neuroevolution in the nero video game. IEEE Trans. Evol. Comput. 9(6), 653–668 (2005)
G. Suarez-Tangil, E. Palomar, J.M. de Fuentes, J. Blasco, A. Ribagorda, Automatic rule generation based on genetic programming for event correlation, in Computational Intelligence in Security for Information Systems, ed. by A. Herrero Cosio, E. Corchado Rodriguez (Springer, Berlin, 2009), pp. 127–134
Symantec Security Response: Mirai: what you need to know about the botnet behind recent major DDoS attacks. https://www.symantec.com/connect/blogs/mirai-what-you-need-know-about-botnet-behind-recent-major-ddos-attacks (2016). Accessed October 10, 2018
M. Szubert, W. Jaskowski, K. Krawiec, Coevolutionary temporal difference learning for othello, in 2009 IEEE Symposium on Computational Intelligence and Games (2009), pp. 104–111
M. Szubert, W. Jaśkowski, K. Krawiec, On scalability, generalization, and hybridization of coevolutionary learning: a case study for othello. IEEE Trans. Comput. Intell. AI Games 5(3), 214–226 (2013)
M.B. Talay, R.J. Calantone, C.M. Voorhees, Coevolutionary dynamics of automotive competition: product innovation, change, and marketplace survival. J. Prod. Innov. Manag. 31(1), 61–78 (2014)
M. Team, Mininet—realistic virtual SDN network emulator. http://mininet.org/ (2018). Accessed July 6, 2018
J. Togelius, P. Burrow, S.M. Lucas, Multi-population competitive co-evolution of car racing controllers, in 2007 IEEE Congress on Evolutionary Computation (2007), pp. 4043–4050
W. Weimer, S. Forrest, C. Le Goues, T. Nguyen, Automatic program repair with evolutionary computation. Commun. ACM 53(5), 109–116 (2010)
Wikimedia Commons: Cuttlefish changing color. https://upload.wikimedia.org/wikipedia/commons/thumb/1/1c/Cuttlefish_color.jpg/636px-Cuttlefish_color.jpg. Picture taken by Nick Hobgood—License: CC BY-SA 3.0
Wikimedia Commons: Misumena vatia with wasp (1998). https://en.wikipedia.org/wiki/File:Misumena.vatia.beute.wespe.1771.jpg#filelinks. Picture taken by Olaf Leillinger—License: CC-BY-SA-2.0/DE and GNU FDL
Wikimedia Commons: Viceroy butterfly (2005). https://commons.wikimedia.org/wiki/File:Viceroy_Butterfly.jpg. License: CC BY-SA 3.0. Subject to disclaimers
Wikimedia Commons: Monarch in may (2007). https://en.wikipedia.org/wiki/Monarch_butterfly#/media/File:Monarch_In_May.jpg. Created: 29 May 2007 By Kenneth Dwain Harrelson—License: CC BY-SA 3.0
Wikimedia Commons: Bioluminnescence in ocean organisms (2014). https://en.wikipedia.org/wiki/Bioluminescence#/media/File:Squid_Counterillumination.png. Picture taken by Chiswick Chap—License: CC BY-SA 4.0
J.L. Wilkerson, D. Tauritz, Coevolutionary automated software correction, in Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, GECCO ’10 (ACM, New York, NY, USA, 2010), pp. 1391–1392
G. Willard, Understanding the co-evolution of cyber defenses and attacks to achieve enhanced cybersecurity. Warfare 14, 17–31 (2015)
N. Williams, M. Mitchell, Investigating the success of spatial coevolution, in Proceedings of the 7th Annual Conference on Genetic and Evolutionary Computation (ACM, 2005), pp. 523–530
M.L. Winterrose, K.M. Carter, Strategic evolution of adversaries against temporal platform diversity active cyber defenses, in Proceedings of the 2014 Symposium on Agent Directed Simulation, p. 9. Society for Computer Simulation International (2014)
B.J. Wood, R. Duggan, et al. Red teaming of advanced information assurance concepts, in DARPA Information Survivability Conference and Exposition, 2000. DISCEX’00. Proceedings, Vol. 2, pp. 112–118 (IEEE, 2000)
D. Wright Jr., Financial alchemy: how tax shelter promoters use financial products to bedevil the IRS (and how the IRS helps them). Ariz. St. LJ 45, 611 (2013)
W. Xu, Y. Qi, D. Evans, Automatically evading classifiers, in Proceedings of the 2016 Network and Distributed Systems Symposium (2016)
J. Yuen, Automated cyber red teaming. Technical report, DTIC Document (2015)
F. Zeng, J. Decraene, M. Low, S. Zhou, W. Cai, Evolving optimal and diversified military operational plans for computational red teaming. Syst. J. IEEE 6(3), 499–509 (2012). https://doi.org/10.1109/JSYST.2012.2190693
Acknowledgements
This was supported by the CSAIL CyberSecurity Initiative. This material is based upon work supported by DARPA. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements. Either expressed or implied of Applied Communication Services, or the US Government. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 799078.
Author information
Authors and Affiliations
Corresponding author
Appendix A
Appendix A
1.1 A.1 Firefly squid bioluminescence defense
When firefly squid are seen from below by a predator, the bioluminescence helps to match the squid’s brightness and color to the sea surface above.
1.2 A.2 A coevolutionary perspective of the U.S. automotive industry
Talay, Calantone, and Voorhees presented an study that explicitly terms competitive interactions between firms “Red Queen competition”, in which gains from innovations are relative and impermanent [133].
1.3 A.3 Advanced persistent threats and ransomware
Some DOS attacks includes Advanced Persistent Threats (APT) and Ransomware. The first ones have multiple stages starting at external reconnaissance then moving to intrusion (e.g. social engineering or use of zero day exploits), laterally moving malware, command and control direction to data exfiltration and, finally, self-erasure. Ransomware, which largely preys upon unpatched systems and which exploits anonymous payment channels enabled by Bitcoin, has also recently become more frequent.
1.4 A.4 Cyber security attack categorization
Examples of attacks, classifications and taxonomies can be found at https://cwe.mitre.org/index.html. One categorization is: (A) Advanced Persistent Threats, “lurking” threats from resourceful persevering adversaries. (B) Denial of Service Attack, defense resource limitation and exposure, means of penetrating systems. (C) Identity theft, e.g. impersonating users. Attacks are also characterized by their stages on a timeline. Another characterization is based on the attacker identity, from individuals to organized criminals and nation states, and what resources they access, see [21] for details.
Rights and permissions
About this article
Cite this article
O’Reilly, UM., Toutouh, J., Pertierra, M. et al. Adversarial genetic programming for cyber security: a rising application domain where GP matters. Genet Program Evolvable Mach 21, 219–250 (2020). https://doi.org/10.1007/s10710-020-09389-y
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10710-020-09389-y