top-1

top-2 top-3

top-4 top-5

menutop

   Program

 

   Committee

 

   Author Index

 

   Search

 

   About GECCO

 

   CD Tech Support

menubot2

 

 

 

 

Session:

Workshop - Military and Security Applications of Evolutionary Computation

Title:

Analysis of Attack Graphs using Evolutionary Computation

 

 

Authors:

Melissa B Danforth

 

 

Abstract:

Attack graphs are a tool to evaluate the security of the network as a whole rather than looking at individual machines. They can discover ``foothold'' situations where an attacker compromises a series of machines to use as a platform within the network to achieve the final goal(s). Attack graphs are visually complex for all but the smallest networks. Analyzing the graphs to determine a set of actions to take would provide administrators with a plan of action to secure a system. However, determining the minimal set of hardening measures is a reduction of the set cover problem and thus NP. This work explores the use of genetic algorithms to determine a set of hardening measures that maximize the security benefit while minimizing the cost.

 

 

CD-ROM Produced by X-CD Technologies