Basic Genetic Algorithm pattern for use in self-organizing agile security
Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organiz...
Saved in:
| Published in | 2012 IEEE International Carnahan Conference on Security Technology (ICCST) pp. 305 - 311 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.10.2012
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1467324507 9781467324502 |
| ISSN | 1071-6572 |
| DOI | 10.1109/CCST.2012.6393577 |
Cover
| Abstract | Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System. |
|---|---|
| AbstractList | Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System. |
| Author | Dove, R. Messenger, R. |
| Author_xml | – sequence: 1 givenname: R. surname: Messenger fullname: Messenger, R. organization: Stevens Inst. of Technol., Hoboken, NJ, USA – sequence: 2 givenname: R. surname: Dove fullname: Dove, R. organization: Stevens Inst. of Technol., Hoboken, NJ, USA |
| BookMark | eNotkM1Kw0AcxFesYFvzAOJlXyBxP7Jfxxq0FgoerOeySf4bV9JN2U0P9ekNmMPwYwZmDrNCizAEQOiRkoJSYp6r6vNQMEJZIbnhQqkblBmlaSkVZ2Vp5C1azUYQtUBLShTNpVDsHmUp_RBCph1pJFui3YtNvsFbCDBO3PTdEP34fcJnO44QA3ZDxJcE2AecoHf5EDsb_K8PHbad72FKm8tUuT6gO2f7BNnMNfp6ez1U7_n-Y7urNvvcUyXGvHVt3ThZSw2yFIaXoJvWGrCGWTZJW-EEkUxLrowUXGvLhDaU123DoNZ8jZ7-dz0AHM_Rn2y8Hucn-B8um1F8 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/CCST.2012.6393577 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781467324496 1467324515 1467324493 9781467324519 |
| EndPage | 311 |
| ExternalDocumentID | 6393577 |
| Genre | orig-research |
| GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS ~02 |
| ID | FETCH-LOGICAL-i175t-dfdbcf6b68e645934e8cda9ea92a292a8a5f50628637965388a258913bdc2eb83 |
| IEDL.DBID | RIE |
| ISBN | 1467324507 9781467324502 |
| ISSN | 1071-6572 |
| IngestDate | Wed Aug 27 03:42:42 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-dfdbcf6b68e645934e8cda9ea92a292a8a5f50628637965388a258913bdc2eb83 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_6393577 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-Oct. |
| PublicationDateYYYYMMDD | 2012-10-01 |
| PublicationDate_xml | – month: 10 year: 2012 text: 2012-Oct. |
| PublicationDecade | 2010 |
| PublicationTitle | 2012 IEEE International Carnahan Conference on Security Technology (ICCST) |
| PublicationTitleAbbrev | CCST |
| PublicationYear | 2012 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001106962 ssj0023718 |
| Score | 1.8215103 |
| Snippet | Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 305 |
| SubjectTerms | Context Filtering algorithms Genetic algorithms Graphics Intrusion detection Qualifications Robots SAREPH Security |
| Title | Basic Genetic Algorithm pattern for use in self-organizing agile security |
| URI | https://ieeexplore.ieee.org/document/6393577 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8IwGG6Ak178AON3evBoYZ_9OCqRoInGREi4kbZ7i0QcBLYLv952G6DGg4dlW7NlW9v0fdY-z_MidMO1p4VQjGgOhlj87xHpCU248T2eGCpFUhBkX2h_GD2N4lEN3W61MABQkM-g7Q6LtfxkrnM3VdahTkfKWB3VGaelVms3n2L_bQTdWkcFIfNLGRzzHb0jKERdlFn8YBHQxuupOg-q5U7fE51u923gGF9Bu3raj7QrRdTpHaDnzfuWZJOPdp6ptl7_snL87wcdotZO34dft5HrCNUgPUb736wJm-jxXtr2w86V2nYtfDebzJfT7P0TLwpDzhRbsIvzFeBpilcwM6RMD7W2N2M5sUONLS0z47XQsPcw6PZJlXaBTC2WyEhiEqUNVZSDc5oJI-A6kQKkCGRgNy5jEzvpJQ2ZoHbA5DJwuQlDlegAFA9PUCOdp3CKsFTSXR_5BqIIILbhMJbM2D2VIDk_Q01XKeNF6awxrurj_O_iC7TnGqak0l2iRrbM4cpCgkxdF33hC7ZNrzE |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG0QD-rFH2D8bQ8eHWzd1rVHJRJQICZCwo103Vck4iCwXfjrbbcBajx4WLY1W7a1Tb-39r33IXTHpC05DwNLMlCWxv-2JWwuLaYcm0WKCh5lBNkebQ2856E_LKH7jRYGADLyGdTMYbaWH81kaqbK6tToSINgB-36nuf5uVprO6Oi_2443ZhHETdwciFc4BiCB8lkXTTQCEJjoLXbU3FOigVPx-b1RuOtbzhfpFY870filSzuNA9Rd_3GOd3ko5YmYU2ufpk5_veTjlB1q_DDr5vYdYxKEJ-gg2_mhBXUfhS6BbHxpdadCz9Mx7PFJHn_xPPMkjPGGu7idAl4EuMlTJWVJ4ha6ZuxGOvBRpfmufGqaNB86jdaVpF4wZpoNJFYkYpCqWhIGRivGdcDJiPBQXAiiN6Y8JVvxJfUDTjVQyYTxGQndMNIEgiZe4rK8SyGM4RFKMz1nqPA8wB8HRB9ESi9pwIEY-eoYiplNM-9NUZFfVz8XXyL9lr9bmfUafdeLtG-aaScWHeFyskihWsNEJLwJusXXxpssn4 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+International+Carnahan+Conference+on+Security+Technology+%28ICCST%29&rft.atitle=Basic+Genetic+Algorithm+pattern+for+use+in+self-organizing+agile+security&rft.au=Messenger%2C+R.&rft.au=Dove%2C+R.&rft.date=2012-10-01&rft.pub=IEEE&rft.isbn=9781467324502&rft.issn=1071-6572&rft.spage=305&rft.epage=311&rft_id=info:doi/10.1109%2FCCST.2012.6393577&rft.externalDocID=6393577 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1071-6572&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1071-6572&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1071-6572&client=summon |