Evolving computer intrusion scripts for vulnerability assessment and log analysis

  • Authors:
  • Julien Budynek;Eric Bonabeau;Ben Shargel

  • Affiliations:
  • Icosystem, Cambridge, MA;Icosystem, Cambridge, MA;New York University, New York, NY

  • Venue:
  • GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks and become difficult to detect from log file analysis.