We evaluate the performance of a genetic algorithm to discover the best set of rules to implement an intrusion against an ICT network. The rules determine how the attacker selects and sequentializes its actions to implement an intrusion. The fitness of a set of rules is assigned after exploiting it in an intrusion. The evaluation of the distinct sets of rules in the populations the algorithm considers requires multiple intrusions. To avoid the resulting noise on the ICT network, the intrusions target a digital twin of the network. We present a preliminary experimental results that supports the feasibility of the proposed solution.

Baiardi, F., Maggi, D., Passacantando, M. (2022). Discovering How to Attack a System. In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT (pp.548-553) [10.5220/0011270000003283].

Discovering How to Attack a System

Passacantando, Mauro
2022

Abstract

We evaluate the performance of a genetic algorithm to discover the best set of rules to implement an intrusion against an ICT network. The rules determine how the attacker selects and sequentializes its actions to implement an intrusion. The fitness of a set of rules is assigned after exploiting it in an intrusion. The evaluation of the distinct sets of rules in the populations the algorithm considers requires multiple intrusions. To avoid the resulting noise on the ICT network, the intrusions target a digital twin of the network. We present a preliminary experimental results that supports the feasibility of the proposed solution.
paper
Genetic Algorithm; Rule based System; Attack Strategy; Digital Twin
English
19th International Conference on Security and Cryptography - SECRYPT - July 11-13, 2022
2022
Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT
978-989-758-590-6
2022
548
553
https://www.scitepress.org/ProceedingsDetails.aspx?ID=s9ar+Z8WC/I=&t=1
open
Baiardi, F., Maggi, D., Passacantando, M. (2022). Discovering How to Attack a System. In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT (pp.548-553) [10.5220/0011270000003283].
File in questo prodotto:
File Dimensione Formato  
Baiardi-2022-SECRYPT22-VoR.pdf

accesso aperto

Descrizione: Proceeding - In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, 548-553, 2022 , Lisbon, Portugal
Tipologia di allegato: Publisher’s Version (Version of Record, VoR)
Licenza: Creative Commons
Dimensione 428.77 kB
Formato Adobe PDF
428.77 kB Adobe PDF Visualizza/Apri
Baiardi-2022-SECRYPT22-AAM.pdf

accesso aperto

Descrizione: Proceeding - In Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, 548-553, 2022 , Lisbon, Portugal
Tipologia di allegato: Author’s Accepted Manuscript, AAM (Post-print)
Licenza: Creative Commons
Dimensione 245.58 kB
Formato Adobe PDF
245.58 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10281/392279
Citazioni
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
Social impact