skip to main content
10.1145/3377929.3398133acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Adversarial threats to large satellite networks (ATLAS-N): a coevolutionary approach based on flipit

Published:08 July 2020Publication History

ABSTRACT

Global connectivity from space using proliferated low Earth orbit (P-LEO) satellite constellations can benefit society at large. An increasing number of public and private actors rely on services that are provided from space through satellites, including Earth monitoring, communications, and internet access. As the dependence of society on satellite constellations grows, threats to P-LEO assets are more likely to increase. Developing strategies that are effective and efficient to defend P-LEO constellations against different types of attacks is warranted. As a first step, we develop a framework to evolve defense strategies for a low-fidelity constellation system against selected low-fidelity adversarial actions by evolving attack strategies, and the strategies are evolved using coevolutionary algorithms. Results show that attackers can easily overcome defenses that are unaware and non-reactive to executed attacks and demonstrate that it may be possible to perform meaningful coevolution of attack and defense strategies that consider selective actions on individual satellites in a constellation. Evolved attack and defense strategies have the potential to promote the development of robust, reliable, and secure P-LEO constellations.

References

  1. Holly Arnold, David Masad, Giuliano Andrea Pagani, Johannes Schmidt, and Elena Stepanova. 2013. NetAttack: co-evolution of network and attacker. In Proceedings of the Santa Fe Institute Complex Systems Summer School.Google ScholarGoogle Scholar
  2. Kevin D Bowers, Marten Van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L Rivest, and Nikos Triandopoulos. 2012. Defending against the unknown enemy: Applying FlipIt to system security. In International Conference on Decision and Game Theory for Security. Springer, 248--263.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dave Cliff and Geoffrey F Miller. 1995. Tracking the red queen: Measurements of adaptive progress in co-evolutionary simulations. In European Conference on Artificial Life. Springer, 200--218.Google ScholarGoogle ScholarCross RefCross Ref
  4. Richard Colbaugh and Kristin Glass. 2012. Leveraging sociological models for prediction I: Inferring adversarial relationships. In 2012 IEEE International Conference on Intelligence and Security Informatics. IEEE, 66--71.Google ScholarGoogle ScholarCross RefCross Ref
  5. Richard Colbaugh and Kristin Glass. 2012. Predictability-oriented defense against adaptive adversaries. In 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2721--2727.Google ScholarGoogle ScholarCross RefCross Ref
  6. Inigo del Portillo, Bruce G Cameron, and Edward F Crawley. 2019. A technical comparison of three low earth orbit satellite constellation systems to provide global broadband. Acta Astronautica 159 (2019), 123--135.Google ScholarGoogle ScholarCross RefCross Ref
  7. Gregory Falco. 2018. The Vacuum of Space Cyber Security. In 2018 AIAA SPACE and Astronautics Forum and Exposition. 5275.Google ScholarGoogle Scholar
  8. Dennis Garcia, Anthony Erb Lugo, Erik Hemberg, and Una-May O'Reilly. 2017. Investigating coevolutionary archive based genetic algorithms on cyber defense networks. In Proceedings of the Genetic and Evolutionary Computation Conference Companion. 1455--1462.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Todd Harrison, Kaitlyn Johnson, and Thomas G Roberts. 2019. Space Threat Assessment 2019. Center for Strategic and International Studies.Google ScholarGoogle Scholar
  10. Ethan Heilman. 2020. Play FlipIt Online. (May 2020). Retrieved May 8, 2020 from http://ethanheilman.github.io/flipIt/playable_with_instructions.htmlGoogle ScholarGoogle Scholar
  11. Stephen T Jones, Alexander V Outkin, Jared Lee Gearhart, Jacob Aaron Hobbs, John Daniel Siirola, Cynthia A Phillips, Stephen Joseph Verzi, Daniel Tauritz, Samuel A Mulder, and Asmeret Bier Naugle. 2017. PLADD: Deterring Attacks on Cyber Systems and Moving Target Defense. Technical Report. Sandia National Lab.(SNL-NM), Albuquerque, NM (United States).Google ScholarGoogle Scholar
  12. Aron Laszka, Gabor Horvath, Mark Felegyhazi, and Levente Buttyán. 2014. FlipThem: Modeling targeted attacks with FlipIt for multiple resources. In International Conference on Decision and Game Theory for Security. Springer, 175--194.Google ScholarGoogle ScholarCross RefCross Ref
  13. Anthony Erb Lugo, Dennis Garcia, Erik Hemberg, and Una-May O'Reilly. 2017. Developing proactive defenses for computer networks with coevolutionary genetic algorithms. In Proceedings of the Genetic and Evolutionary Computation Conference Companion. 273--274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kinga Mrugala, Nilufer Tuptuk, and Stephen Hailes. 2017. Evolving attackers against wireless sensor networks using genetic programming. IET Wireless Sensor Systems 7, 4 (2017), 113--122.Google ScholarGoogle ScholarCross RefCross Ref
  15. Alan Nochenson, Jens Grossklags, et al. 2013. A behavioral investigation of the FlipIt game. In Proceedings of the 12th Workshop on the Economics of Information Security (WEIS). 93.Google ScholarGoogle Scholar
  16. Elena Popovici, Anthony Bucci, R Paul Wiegand, and Edwin D De Jong. 2012. Coevolutionary Principles. (2012).Google ScholarGoogle Scholar
  17. George Rush, Daniel R Tauritz, and Alexander D Kent. 2015. Coevolutionary agent-based network defense lightweight event system (CANDLES). In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation. 859--866.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Marten Van Dijk, Ari Juels, Alina Oprea, and Ronald L Rivest. 2013. FlipIt: The game of "stealthy takeover". Journal of Cryptology 26, 4 (2013), 655--713.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. James Richard Wertz. 2001. Mission geometry: orbit and constellation design and management: spacecraft orbit and attitude systems. Mission geometry: orbit and constellation design and management: spacecraft orbit and attitude systems/James R. Wertz. El Segundo, CA; Boston: Microcosm: Kluwer Academic Publishers, 2001. Space technology library; 13 (2001).Google ScholarGoogle Scholar

Index Terms

  1. Adversarial threats to large satellite networks (ATLAS-N): a coevolutionary approach based on flipit
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GECCO '20: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion
      July 2020
      1982 pages
      ISBN:9781450371278
      DOI:10.1145/3377929

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 July 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,669of4,410submissions,38%

      Upcoming Conference

      GECCO '24
      Genetic and Evolutionary Computation Conference
      July 14 - 18, 2024
      Melbourne , VIC , Australia
    • Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader