Abstract
We apply Grammatical Evolution (GE), and multi population competitive coevolutionary algorithms to the domain of cybersecurity. Our interest (and concern) is the evolution of network denial of service attacks. In these cases, when attackers are deterred by a specific defense, they evolve their strategies until variations find success. Defenders are then forced to counter the new variations and an arms race ensues. We use GE and grammars to conveniently express and explore the behavior of network defenses and denial of service attacks under different mission and network scenarios. We use coevolution to model competition between attacks and defenses and the larger scale arms race. This allows us to study the dynamics and the solutions of the competing adversaries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In RIVALS’ implementation, Python’s random library is used.
References
K. Adamu, S. Phelps, Coevolutionary grammatical evolution for building trading algorithms, in Electrical Engineering and Applied Computing (Springer, Berlin, 2011), pp. 311–322
M. Alfonseca, S. Gil, Evolving a predator–prey ecosystem of mathematical expressions with grammatical evolution. Complexity 20(3), 66–83 (2015)
R.M.A. Azad, C. Ryan, An examination of simultaneous evolution of grammars and solutions, in Genetic Programming Theory and Practice III (Springer, Berlin, 2006), pp. 141–158
J.C. Bongard, H. Lipson, Nonlinear system identification using coevolution of models and tests. IEEE Trans. Evol. Comput. 9(4), 361–384 (2005)
E.D. de Jong, A monotonic archive for pareto-coevolution. Evol. Comput. 15(1), 61–93 (2007)
E. De Jong, The maxsolve algorithm for coevolution, in Proceedings of the 7th Annual Conference on Genetic and Evolutionary Computation (ACM, New York, 2005), pp. 483–489
I. Dempsey, M. O’Neill, A. Brabazon, Foundations in Grammatical Evolution for Dynamic Environments, vol. 194 (Springer, Berlin, 2009)
S.G. Ficici, Solution concepts in coevolutionary algorithms. PhD thesis, Brandeis University, 2004
P. Gabrielsson, U. Johansson, R. Konig, Co-evolving online high-frequency trading strategies using grammatical evolution, in 2014 IEEE Conference on Computational Intelligence for Financial Engineering & Economics (CIFEr) (IEEE, New York, 2014), pp. 473–480
D. Garcia, A.E. Lugo, E. Hemberg, U.-M. O’Reilly, Investigating coevolutionary archive based genetic algorithms on cyber defense networks, in Proceedings of the Genetic and Evolutionary Computation Conference Companion (ACM, New York, 2017), pp. 1455–1462
R. Harper, Evolving robocode tanks for Evo robocode. Genet. Program Evolvable Mach. 15(4), 403–431 (2014)
E. Hemberg, J. Rosen, G. Warner, S. Wijesinghe, U.-M. O’Reilly, Detecting tax evasion: a co-evolutionary approach. Artif. Intell. Law 24(2), 149–182 (2016)
M.I. Heywood, Evolutionary model building under streaming data for classification tasks: opportunities and challenges. Genet. Program Evolvable Mach. 16(3), 283–326 (2015)
K. Krawiec, M. Heywood, Solving complex problems with coevolutionary algorithms, in Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion (ACM, New York, 2016), pp. 687–713
A. Kuzmanovic, E.W. Knightly, Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants, in Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM, New York, 2003), pp. 75–86
C. Le Goues, A. Nguyen-Tuong, H. Chen, J.W. Davidson, S. Forrest, J.D. Hiser, J.C. Knight, M. Van Gundy, Moving target defenses in the helix self-regenerative architecture, in Moving Target Defense II (Springer, Berlin, 2013), pp. 117–149
A.R. McIntyre, M.I. Heywood, Multi-objective competitive coevolution for efficient GP classifier problem decomposition, in IEEE International Conference on Systems, Man and Cybernetics, 2007. ISIC (IEEE, New York, 2007), pp. 1930–1937
A.R. McIntyre, M.I. Heywood, Cooperative problem decomposition in pareto competitive classifier models of coevolution, in Genetic Programming (Springer, Berlin, 2008), pp. 289–300
E. Popovici, A. Bucci, R.P. Wiegand, E.D. De Jong, Coevolutionary principles, in Handbook of Natural Computing (Springer, Berlin, 2012), pp. 987–1033
G. Rush, D.R. Tauritz, A.D. Kent, Coevolutionary agent-based network defense lightweight event system (candles), in Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference (ACM, New York, 2015), pp. 859–866
K.O. Stanley, R. Miikkulainen, Competitive coevolution through evolutionary complexification. J. Artif. Intell. Res. (JAIR) 21, 63–100 (2004)
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149–160 (2001)
D.R. Tauritz, A no-free-lunch framework for coevolution, in Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (ACM, New York, 2008), pp. 371–378
P.A. Whigham, G. Dick, J. Maclaurin, C.A. Owen, Examining the best of both worlds of grammatical evolution, in Proceedings of the 2015 on Genetic and Evolutionary Computation Conference (ACM, New York, 2015), pp. 1111–1118
M.L. Winterrose, K.M. Carter, Strategic evolution of adversaries against temporal platform diversity active cyber defenses, in Proceedings of the 2014 Symposium on Agent Directed Simulation (Society for Computer Simulation International, 2014), p. 9
Acknowledgements
This material is based upon the work supported by DARPA. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements. Either expressed or implied of Applied Communication Services, or the US Government.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Hemberg, E., Lugo, A.E., Garcia, D., O’Reilly, UM. (2018). Grammatical Evolution with Coevolutionary Algorithms in Cyber Security. In: Ryan, C., O'Neill, M., Collins, J. (eds) Handbook of Grammatical Evolution. Springer, Cham. https://doi.org/10.1007/978-3-319-78717-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-78717-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78716-9
Online ISBN: 978-3-319-78717-6
eBook Packages: Computer ScienceComputer Science (R0)