Analysis of key installation protection using computerized red teaming

  • Authors:
  • Tirtha R. Ranjeet;Philip Hingston;Chiou-Peng Lam;Martin Masek

  • Affiliations:
  • Edith Cowan University, Mount Lawley, Western Australia;Edith Cowan University, Mount Lawley, Western Australia;Edith Cowan University, Mount Lawley, Western Australia;Edith Cowan University, Mount Lawley, Western Australia

  • Venue:
  • ACSC '11 Proceedings of the Thirty-Fourth Australasian Computer Science Conference - Volume 113
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes the use of genetic algorithms (GAs) for computerized red teaming applications, to explore options for military plans in specific scenarios. A tool called Optimized Red Teaming (ORT) is developed and we illustrate how it may be utilized to assist the red teaming process in security organizations, such as military forces. The developed technique incorporates a genetic algorithm in conjunction with an agent-based simulation system (ABS) called MANA (Map Aware Non-uniform Automata). Both enemy forces (the red team) and friendly forces (the blue team) are modelled as intelligent agents in a multi-agent system and many computer simulations of a scenario are run, pitting the red team plan against the blue team plan. The paper contains two major sections. First, we present a description of the ORT tool, including its various components. Second, experimental results obtained using ORT on a specific military scenario known as Key Installation Protection, developed at DSO National Laboratories in Singapore, are presented. The aim of these experiments is to explore the red tactics to penetrate a fixed blue patrolling strategy.