Sciweavers

GECCO
2005
Springer

Evolving computer intrusion scripts for vulnerability assessment and log analysis

13 years 10 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks and become difficult to detect from log file analysis. Categories and Subject Descriptors I.2.6 [Learning], I.2.8 [Problem Solving, Control Methods, and Search] General Terms Algorithms, Economics. Keywords Hacker, script kiddies, agent-based model, log analysis, vulnerability assessment.
Julien Budynek, Eric Bonabeau, Ben Shargel
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where GECCO
Authors Julien Budynek, Eric Bonabeau, Ben Shargel
Comments (0)