abstract = "In this work, we investigate the ability of genetic
programming techniques to evolve valid network
patterns, while avoiding detectability by obfuscating
the intent of the traffic. In order to validate our
system's capabilities, we choose to evolve a port scan
attack while running the packets through an Intrusion
Detection System (IDS). In turn, the evolutionary
process uses feedback such that it minimizes the alarms
raised while port scanning across a network range.
Results build off of previous work allow us to further
analyse and understand what the role of introns, code
bloat, play in the systems ability to reduce the
detectability of it malicious behaviour.",