KŮR, Jiří, Václav MATYÁŠ and Petr ŠVENDA. Evolutionary Design of Attack Strategies. In Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M. Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Německo: Springer Verlag, 2013, p. 3-17. ISBN 978-3-642-36212-5. Available from: https://dx.doi.org/10.1007/978-3-642-36213-2_2. |
Other formats:
BibTeX
LaTeX
RIS
@inproceedings{1083037, author = {Kůr, Jiří and Matyáš, Václav and Švenda, Petr}, address = {Německo}, booktitle = {Security Protocols XVII - 17th International Workshop, Revised Selected Papers}, doi = {http://dx.doi.org/10.1007/978-3-642-36213-2_2}, editor = {Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M.}, keywords = {Attack strategy; Evolutionary Algorithm; Security; Wireless Sensor Network}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Německo}, isbn = {978-3-642-36212-5}, pages = {3-17}, publisher = {Springer Verlag}, title = {Evolutionary Design of Attack Strategies}, year = {2013} }
TY - JOUR ID - 1083037 AU - Kůr, Jiří - Matyáš, Václav - Švenda, Petr PY - 2013 TI - Evolutionary Design of Attack Strategies PB - Springer Verlag CY - Německo SN - 9783642362125 KW - Attack strategy KW - Evolutionary Algorithm KW - Security KW - Wireless Sensor Network N2 - We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less). ER -
KŮR, Jiří, Václav MATYÁŠ and Petr ŠVENDA. Evolutionary Design of Attack Strategies. In Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M. \textit{Security Protocols XVII - 17th International Workshop, Revised Selected Papers}. Německo: Springer Verlag, 2013, p.~3-17. ISBN~978-3-642-36212-5. Available from: https://dx.doi.org/10.1007/978-3-642-36213-2\_{}2.
|