Basic Genetic Algorithm pattern for use in self-organizing agile security

Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organiz...

Full description

Saved in:
Bibliographic Details
Published in2012 IEEE International Carnahan Conference on Security Technology (ICCST) pp. 305 - 311
Main Authors Messenger, R., Dove, R.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2012
Subjects
Online AccessGet full text
ISBN1467324507
9781467324502
ISSN1071-6572
DOI10.1109/CCST.2012.6393577

Cover

Abstract Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.
AbstractList Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.
Author Dove, R.
Messenger, R.
Author_xml – sequence: 1
  givenname: R.
  surname: Messenger
  fullname: Messenger, R.
  organization: Stevens Inst. of Technol., Hoboken, NJ, USA
– sequence: 2
  givenname: R.
  surname: Dove
  fullname: Dove, R.
  organization: Stevens Inst. of Technol., Hoboken, NJ, USA
BookMark eNotkM1Kw0AcxFesYFvzAOJlXyBxP7Jfxxq0FgoerOeySf4bV9JN2U0P9ekNmMPwYwZmDrNCizAEQOiRkoJSYp6r6vNQMEJZIbnhQqkblBmlaSkVZ2Vp5C1azUYQtUBLShTNpVDsHmUp_RBCph1pJFui3YtNvsFbCDBO3PTdEP34fcJnO44QA3ZDxJcE2AecoHf5EDsb_K8PHbad72FKm8tUuT6gO2f7BNnMNfp6ez1U7_n-Y7urNvvcUyXGvHVt3ThZSw2yFIaXoJvWGrCGWTZJW-EEkUxLrowUXGvLhDaU123DoNZ8jZ7-dz0AHM_Rn2y8Hucn-B8um1F8
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/CCST.2012.6393577
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781467324496
1467324515
1467324493
9781467324519
EndPage 311
ExternalDocumentID 6393577
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
~02
ID FETCH-LOGICAL-i175t-dfdbcf6b68e645934e8cda9ea92a292a8a5f50628637965388a258913bdc2eb83
IEDL.DBID RIE
ISBN 1467324507
9781467324502
ISSN 1071-6572
IngestDate Wed Aug 27 03:42:42 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-dfdbcf6b68e645934e8cda9ea92a292a8a5f50628637965388a258913bdc2eb83
PageCount 7
ParticipantIDs ieee_primary_6393577
PublicationCentury 2000
PublicationDate 2012-Oct.
PublicationDateYYYYMMDD 2012-10-01
PublicationDate_xml – month: 10
  year: 2012
  text: 2012-Oct.
PublicationDecade 2010
PublicationTitle 2012 IEEE International Carnahan Conference on Security Technology (ICCST)
PublicationTitleAbbrev CCST
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106962
ssj0023718
Score 1.8215103
Snippet Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six...
SourceID ieee
SourceType Publisher
StartPage 305
SubjectTerms Context
Filtering algorithms
Genetic algorithms
Graphics
Intrusion detection
Qualifications
Robots
SAREPH
Security
Title Basic Genetic Algorithm pattern for use in self-organizing agile security
URI https://ieeexplore.ieee.org/document/6393577
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8IwGG6Ak178AON3evBoYZ_9OCqRoInGREi4kbZ7i0QcBLYLv952G6DGg4dlW7NlW9v0fdY-z_MidMO1p4VQjGgOhlj87xHpCU248T2eGCpFUhBkX2h_GD2N4lEN3W61MABQkM-g7Q6LtfxkrnM3VdahTkfKWB3VGaelVms3n2L_bQTdWkcFIfNLGRzzHb0jKERdlFn8YBHQxuupOg-q5U7fE51u923gGF9Bu3raj7QrRdTpHaDnzfuWZJOPdp6ptl7_snL87wcdotZO34dft5HrCNUgPUb736wJm-jxXtr2w86V2nYtfDebzJfT7P0TLwpDzhRbsIvzFeBpilcwM6RMD7W2N2M5sUONLS0z47XQsPcw6PZJlXaBTC2WyEhiEqUNVZSDc5oJI-A6kQKkCGRgNy5jEzvpJQ2ZoHbA5DJwuQlDlegAFA9PUCOdp3CKsFTSXR_5BqIIILbhMJbM2D2VIDk_Q01XKeNF6awxrurj_O_iC7TnGqak0l2iRrbM4cpCgkxdF33hC7ZNrzE
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG0QD-rFH2D8bQ8eHWzd1rVHJRJQICZCwo103Vck4iCwXfjrbbcBajx4WLY1W7a1Tb-39r33IXTHpC05DwNLMlCWxv-2JWwuLaYcm0WKCh5lBNkebQ2856E_LKH7jRYGADLyGdTMYbaWH81kaqbK6tToSINgB-36nuf5uVprO6Oi_2443ZhHETdwciFc4BiCB8lkXTTQCEJjoLXbU3FOigVPx-b1RuOtbzhfpFY870filSzuNA9Rd_3GOd3ko5YmYU2ufpk5_veTjlB1q_DDr5vYdYxKEJ-gg2_mhBXUfhS6BbHxpdadCz9Mx7PFJHn_xPPMkjPGGu7idAl4EuMlTJWVJ4ha6ZuxGOvBRpfmufGqaNB86jdaVpF4wZpoNJFYkYpCqWhIGRivGdcDJiPBQXAiiN6Y8JVvxJfUDTjVQyYTxGQndMNIEgiZe4rK8SyGM4RFKMz1nqPA8wB8HRB9ESi9pwIEY-eoYiplNM-9NUZFfVz8XXyL9lr9bmfUafdeLtG-aaScWHeFyskihWsNEJLwJusXXxpssn4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+International+Carnahan+Conference+on+Security+Technology+%28ICCST%29&rft.atitle=Basic+Genetic+Algorithm+pattern+for+use+in+self-organizing+agile+security&rft.au=Messenger%2C+R.&rft.au=Dove%2C+R.&rft.date=2012-10-01&rft.pub=IEEE&rft.isbn=9781467324502&rft.issn=1071-6572&rft.spage=305&rft.epage=311&rft_id=info:doi/10.1109%2FCCST.2012.6393577&rft.externalDocID=6393577
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1071-6572&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1071-6572&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1071-6572&client=summon