Skip to main content
Article
Evolution of Network Enumeration Strategies in Emulated Computer Networks
Proceedings of the 2018 Genetic and Evolutionary Computation Conference Companion
  • Sean Harris
  • Eric Michalak
  • Kevin Schoonover
  • Adam Gausmann
  • Hannah Reinbolt
  • Joshua Herman
  • Daniel R. Tauritz, Missouri University of Science and Technology
  • Chris Rawlings
  • Aaron Scott Pope
Abstract

Successful attacks on computer networks today do not often owe their victory to directly overcoming strong security measures set up by the defender. Rather, most attacks succeed because the number of possible vulnerabilities are too large for humans to fully protect without making a mistake. Regardless of the security elsewhere, a skilled attacker can exploit a single vulnerability in a defensive system and negate the benefits of those security measures. This paper presents an evolutionary framework for evolving attacker agents in a real, emulated network environment using genetic programming, as a foundation for coevolutionary systems which can automatically discover and mitigate network security flaws. We examine network enumeration, an initial network reconnaissance step, through our framework and present results demonstrating its success, indicating a broader applicability to further cyber-security tasks.

Meeting Name
2018 Genetic and Evolutionary Computation Conference, GECCO 2018 (2018: Jul. 15-19, Kyoto, Japan)
Department(s)
Computer Science
Keywords and Phrases
  • Genetic programming,
  • Network emulation,
  • Network security
International Standard Book Number (ISBN)
978-145035764-7
Document Type
Article - Conference proceedings
Document Version
Final Version
File Type
text
Language(s)
English
Rights
© 2018 The Authors, All rights reserved.
Publication Date
7-1-2018
Disciplines
Citation Information
Sean Harris, Eric Michalak, Kevin Schoonover, Adam Gausmann, et al.. "Evolution of Network Enumeration Strategies in Emulated Computer Networks" Proceedings of the 2018 Genetic and Evolutionary Computation Conference Companion (2018) p. 1640 - 1647
Available at: http://works.bepress.com/daniel-tauritz/72/