2020
DOI: 10.1007/s10710-020-09389-y
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Abstract: Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of their engagements. Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters. Additionally, it prompts res… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(11 citation statements)
references
References 100 publications
0
11
0
Order By: Relevance
“…Thus we can model two populations where the members of each compete, with our formulated competition, pairwise against each other, and the fitness of each member is the sum of the harm that is either inflicted (a maximizing objective for attacks) or incurred (a minimizing objective of the same quantity: harm, for defenses) over all a member's competitions. We note that this basic formulation of interacting circumstances and many competitions also underpin prior work such as [20,22].…”
Section: Coevolutionary Algorithm Variantsmentioning
confidence: 70%
See 1 more Smart Citation
“…Thus we can model two populations where the members of each compete, with our formulated competition, pairwise against each other, and the fitness of each member is the sum of the harm that is either inflicted (a maximizing objective for attacks) or incurred (a minimizing objective of the same quantity: harm, for defenses) over all a member's competitions. We note that this basic formulation of interacting circumstances and many competitions also underpin prior work such as [20,22].…”
Section: Coevolutionary Algorithm Variantsmentioning
confidence: 70%
“…One basis of realism is whether a system runs actual attack code (aka malware) like a threat-actor does. On this basis, RIVALS-Deception [20] runs attack code (when it runs nmap to reconnaissance scan). In the middle of the spectrum of realism, RIVALS-DDOS [20] runs code that models a DOS attack, rather than execute DOS malware.…”
Section: Related Workmentioning
confidence: 99%
“…Pimentel (1961) developed the idea that reciprocal genetic changes can regulate population size in resource-consumer interactions. Even though the idea of coevolution was already there, it was Ehrlich and Raven's thought-provoking publication in 1964 that popularized the term coevolution, impacting ideas even outside biology (O'Reilly et al 2020). During those same years, Janzen's (1966) landmark studies on coevolution of plants and ants, and Smith's (1970) studies of coevolution of pines and squirrels, were published and influenced subsequent studies, especially in evolutionary ecology.…”
Section: Different Coevolution Concepts Before and After Ehrlich And ...mentioning
confidence: 99%
“…This process has successfully optimised software in different ways, some examples are energy [17] and time consumption [49]. It also has already opened new areas of research such as adversarial genetic programming for cybersecurity [66]. However, the main limitation of genetic improvement is code readability, which is one of the open problems of the area [1].…”
Section: Out-of-the-box Applicationsmentioning
confidence: 99%