KŮR, Jiří, Václav MATYÁŠ and Petr ŠVENDA. Evolutionary Design of Attack Strategies. In Christianson, B., Malcolm, J. A., Matyáš, V., Roe, M. Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Německo: Springer Verlag, 2013, p. 3-17. ISBN 978-3-642-36212-5. Available from: https://dx.doi.org/10.1007/978-3-642-36213-2_2.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Evolutionary Design of Attack Strategies
Authors KŮR, Jiří (203 Czech Republic, guarantor, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution).
Edition Německo, Security Protocols XVII - 17th International Workshop, Revised Selected Papers, p. 3-17, 15 pp. 2013.
Publisher Springer Verlag
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/13:00067651
Organization unit Faculty of Informatics
ISBN 978-3-642-36212-5
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-642-36213-2_2
Keywords in English Attack strategy; Evolutionary Algorithm; Security; Wireless Sensor Network
Tags best3
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 28/4/2014 06:18.
Abstract
We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less).
Links
LG13010, research and development projectName: Zastoupení ČR v European Research Consortium for Informatics and Mathematics (Acronym: ERCIM-CZ)
Investor: Ministry of Education, Youth and Sports of the CR
PrintDisplayed: 7/5/2024 20:02