2009 IEEE Symposium on Computational Intelligence in Cyber Security 2009
DOI: 10.1109/cicybs.2009.4925101
|View full text |Cite
|
Sign up to set email alerts
|

Generating mimicry attacks using genetic programming: A benchmarking study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Existing techniques for automated attack discovery include state-machine-informed search [21], open-sourceintelligence [44], bug analysis [19], and genetic programming [23]. Defensive synthesis also exists [3].…”
Section: Related Workmentioning
confidence: 99%
“…Existing techniques for automated attack discovery include state-machine-informed search [21], open-sourceintelligence [44], bug analysis [19], and genetic programming [23]. Defensive synthesis also exists [3].…”
Section: Related Workmentioning
confidence: 99%
“…Empirical data set or simulation model Detection/generation of attack scenarios Communication system (Li, 2004;Lu & Traore, 2004) Cyberattack detection system (Kayacik et al, 2009)…”
Section: Identification Of Attack Scenariosmentioning
confidence: 99%
“…Although heuristic methods do not guarantee optimality, they are suitable in cases where the objective function cannot be represented analytically or when its resolution is computationally infeasible. Specifically, genetic programming (GP) and its variants have been applied to automate the process of detecting and generating attack scenarios, where the objective function corresponded to an attack and its fitness evaluated based on empirical data or simulation (Kayacik et al., 2009; Lu & Traore, 2004; Mabu et al., 2010).…”
Section: Disruption Scenariosmentioning
confidence: 99%
“…A waypoint-based IDS was introduced in [30] to detect both mimicry attacks and impossible paths attacks by considering the trustworthy execution contexts of programs and restricting system call permissions. Besides, there were also existing work conducted on generating mimicry attacks by using generic programming [31] or static binary analysis [28].…”
Section: B Generating and Revealing Stealthy Attacksmentioning
confidence: 99%