Adversarial Genetic Programming for Cyber Security: A Rising Application
Domain Where GP Matters
- URL: http://arxiv.org/abs/2004.04647v1
- Date: Tue, 7 Apr 2020 00:13:14 GMT
- Title: Adversarial Genetic Programming for Cyber Security: A Rising Application
Domain Where GP Matters
- Authors: Una-May O'Reilly and Jamal Toutouh and Marcos Pertierra and Daniel
Prado Sanchez and Dennis Garcia and Anthony Erb Luogo and Jonathan Kelly and
Erik Hemberg
- Abstract summary: Adversarial Genetic Programming for Cyber Security is a research topic that studies the behavior of cyber adversaries and the dynamics of their engagements.
It prompts research questions around evolving complex behavior by expressing different abstractions with GP.
We present a framework called RIVALS which supports the study of network security arms races.
- Score: 10.336476147660383
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyber security adversaries and engagements are ubiquitous and ceaseless. We
delineate Adversarial Genetic Programming for Cyber Security, a research topic
that, by means of genetic programming (GP), replicates and studies the behavior
of cyber adversaries and the dynamics of their engagements. Adversarial Genetic
Programming for Cyber Security encompasses extant and immediate research
efforts in a vital problem domain, arguably occupying a position at the
frontier where GP matters. Additionally, it prompts research questions around
evolving complex behavior by expressing different abstractions with GP and
opportunities to reconnect to the Machine Learning, Artificial Life,
Agent-Based Modeling and Cyber Security communities. We present a framework
called RIVALS which supports the study of network security arms races. Its goal
is to elucidate the dynamics of cyber networks under attack by computationally
modeling and simulating them.
Related papers
- Attack Atlas: A Practitioner's Perspective on Challenges and Pitfalls in Red Teaming GenAI [52.138044013005]
generative AI, particularly large language models (LLMs), become increasingly integrated into production applications.
New attack surfaces and vulnerabilities emerge and put a focus on adversarial threats in natural language and multi-modal systems.
Red-teaming has gained importance in proactively identifying weaknesses in these systems, while blue-teaming works to protect against such adversarial attacks.
This work aims to bridge the gap between academic insights and practical security measures for the protection of generative AI systems.
arXiv Detail & Related papers (2024-09-23T10:18:10Z) - A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes [1.3631461603291568]
Generative Adversarial Networks (GANs) have emerged as powerful solutions for addressing the constantly changing security issues.
This survey studies the significance of the deep learning model, precisely on GANs, in strengthening cybersecurity defenses.
The focus is to examine how GANs can be influential tools to strengthen cybersecurity defenses in these domains.
arXiv Detail & Related papers (2024-07-11T19:51:48Z) - Generative AI in Cybersecurity [0.0]
Generative Artificial Intelligence (GAI) has been pivotal in reshaping the field of data analysis, pattern recognition, and decision-making processes.
As GAI rapidly progresses, it outstrips the current pace of cybersecurity protocols and regulatory frameworks.
The study highlights the critical need for organizations to proactively identify and develop more complex defensive strategies to counter the sophisticated employment of GAI in malware creation.
arXiv Detail & Related papers (2024-05-02T19:03:11Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - A Survey on Explainable Artificial Intelligence for Cybersecurity [14.648580959079787]
Explainable Artificial Intelligence (XAI) aims to create machine learning models that can provide clear and interpretable explanations for their decisions and actions.
In the field of network cybersecurity, XAI has the potential to revolutionize the way we approach network security by enabling us to better understand the behavior of cyber threats.
arXiv Detail & Related papers (2023-03-07T22:54:18Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey [1.3299946892361474]
Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber and physical equipment to run at an optimal operating point.
Cyberattacks are the principal threats confronting the usage and advancement of the state-of-the-art systems.
Machine learning (ML) is being used to exploit and defend the cyberattacks in SG by the attackers and system operators.
arXiv Detail & Related papers (2020-09-01T05:16:51Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.