Automatically Evading IDS using GP Authored Attacks
Created by W.Langdon from
gp-bibliography.bib Revision:1.7970
- @InProceedings{Kayacik:2007:CISDA,
-
author = "H. Gunes Kayacik and A. Nur Zincir-Heywood and
Malcolm I. Heywood",
-
title = "Automatically Evading IDS using GP Authored Attacks",
-
booktitle = "IEEE Symposium on computational Intelligence in
Security and Defense Applications",
-
year = "2007",
-
pages = "153--160",
-
address = "Honolulu",
-
month = apr # " 1-5",
-
publisher = "IEEE Press",
-
keywords = "genetic algorithms, genetic programming, mimicry
attack generation, vulnerability testing",
-
DOI = "doi:10.1109/CISDA.2007.368148",
-
size = "8 pages",
-
abstract = "A mimicry attack is a type of attack where the basic
steps of a minimalist core attack are used to design
multiple attacks achieving the same objective from the
same application. Research in mimicry attacks is
valuable in determining and eliminating weaknesses of
detectors. In this work, we provide a genetic
programming based automated process for designing all
components of a mimicry attack relative to the Stide
detector under a vulnerable Traceroute application.
Results indicate that the automatic process is able to
generate mimicry attacks that reduce the alarm rate
from 65percent of the original attack, to 2.7percent,
effectively making the attack indistinguishable from
normal behaviors.",
-
notes = "http://www.cidefense.org/",
- }
Genetic Programming entries for
Hilmi Gunes Kayacik
Nur Zincir-Heywood
Malcolm Heywood
Citations