Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.
Hilmi Günes KayacikA. Nur Zincir-HeywoodMalcolm I. HeywoodPublished in: Evol. Intell. (2011)
Keyphrases
- evolutionary computation
- countermeasures
- artificial life
- attack graphs
- evolutionary algorithm
- genetic programming
- computational intelligence
- penetration testing
- swarm intelligence
- security vulnerabilities
- machine learning and data mining
- fitness function
- fuzzy systems
- optimisation problems
- genetic algorithm
- evolutionary design
- attack graph
- security risks
- defense mechanisms
- cooperative coevolution
- fuzzy logic
- attack scenarios
- gene expression programming
- evolutionary approaches
- buffer overflow
- information security
- sql injection
- nature inspired algorithms
- evolutionary learning
- evolvable hardware
- test cases
- soft computing
- multi objective
- data mining
- power system
- attack detection
- search algorithm
- reinforcement learning
- estimation of distribution algorithms
- artificial intelligence
- genetic algorithm ga