Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Missouri University of Science and Technology

2018

Genetic programming

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Automated Design Of Network Security Metrics, Aaron Scott Pope, Daniel R. Tauritz, Robert Morning, Alexander D. Kent Jul 2018

Automated Design Of Network Security Metrics, Aaron Scott Pope, Daniel R. Tauritz, Robert Morning, Alexander D. Kent

Computer Science Faculty Research & Creative Works

Many abstract security measurements are based on characteristics of a graph that represents the network. These are typically simple and quick to compute but are often of little practical use in making real-world predictions. Practical network security is often measured using simulation or real-world exercises. These approaches better represent realistic outcomes but can be costly and time-consuming. This work aims to combine the strengths of these two approaches, developing efficient heuristics that accurately predict attack success. Hyper-heuristic machine learning techniques, trained on network attack simulation training data, are used to produce novel graph-based security metrics. These low-cost metrics serve as …


Evolution Of Network Enumeration Strategies In Emulated Computer Networks, Sean Harris, Eric Michalak, Kevin Schoonover, Adam Gausmann, Hannah Reinbolt, Joshua Herman, Daniel R. Tauritz, Chris Rawlings, Aaron Scott Pope Jul 2018

Evolution Of Network Enumeration Strategies In Emulated Computer Networks, Sean Harris, Eric Michalak, Kevin Schoonover, Adam Gausmann, Hannah Reinbolt, Joshua Herman, Daniel R. Tauritz, Chris Rawlings, Aaron Scott Pope

Computer Science Faculty Research & Creative Works

Successful attacks on computer networks today do not often owe their victory to directly overcoming strong security measures set up by the defender. Rather, most attacks succeed because the number of possible vulnerabilities are too large for humans to fully protect without making a mistake. Regardless of the security elsewhere, a skilled attacker can exploit a single vulnerability in a defensive system and negate the benefits of those security measures. This paper presents an evolutionary framework for evolving attacker agents in a real, emulated network environment using genetic programming, as a foundation for coevolutionary systems which can automatically discover and …