Evolutionary Design of Attack Strategies

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

KŮR Jiří MATYÁŠ Václav ŠVENDA Petr

Year of publication 2013
Type Article in Proceedings
Conference Security Protocols XVII - 17th International Workshop, Revised Selected Papers
MU Faculty or unit

Faculty of Informatics

Citation
Doi http://dx.doi.org/10.1007/978-3-642-36213-2_2
Field Informatics
Keywords Attack strategy; Evolutionary Algorithm; Security; Wireless Sensor Network
Description We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less).
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.