Testing Detector Parameterization Using Evolutionary Exploit Generation

  • Authors:
  • Hilmi G. Kayacık;A. Nur Zincir-Heywood;Malcolm I. Heywood;Stefan Burschka

  • Affiliations:
  • Faculty of Computer Science, Dalhousie University, Halifax NS, Canada B3H 1W5;Faculty of Computer Science, Dalhousie University, Halifax NS, Canada B3H 1W5;Faculty of Computer Science, Dalhousie University, Halifax NS, Canada B3H 1W5;Software & Security Technologies, Swisscom Innovations, Switzerland

  • Venue:
  • EvoWorkshops '09 Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no knowledge of protected data structures need be assumed. Secondly, the evolved exploits are then able to demonstrate weaknesses in the ensuing detector parameterization. In this work we focus on the parameterization of the second generation anomaly detector `pH' and demonstrate how use of an EEG may identify weak parameterization of the detector.