NetAttack: Co-Evolution of Network and Attacker
نویسندگان
چکیده
Interactions between individuals or organizations, and the changes and evolutions that result, are a central theme of complexity research. NetAttack aims at modeling a network environment where an attacker and a defender compete to disrupt a network or keep it connected. The choices of how to attack and defend the network are governed by a Genetic Algorithms (GA) which is used to choose among a set of available strategies. Our analysis shows that the choice of strategy is particularly important if the resources available to attacker and defender are similar. In such a situation, the defender and attacker genomes co-evolve and find an equilibrium. The best strategies found through GAs by the attackers and defenders are based on betweenness centrality. Our results agree with previous literature assessing strategies for network attack and defense in a static context. However, our paper is the first to show how a GA approach can be applied in a dynamic game on a network. This research provides a starting-point to further explore strategies and to optimize network disruption and reconstruction. Many applications for our kind of analysis may be found in the field of security and safety dealing with social (criminal networks) and technological (computer networks) contexts. ∗email: [email protected] †email: [email protected] ‡email: [email protected] §email: [email protected] ¶email: [email protected]
منابع مشابه
An Unsupervised Learning Method for an Attacker Agent in Robot Soccer Competitions Based on the Kohonen Neural Network
RoboCup competition as a great test-bed, has turned to a worldwide popular domains in recent years. The main object of such competitions is to deal with complex behavior of systems whichconsist of multiple autonomous agents. The rich experience of human soccer player can be used as a valuable reference for a robot soccer player. However, because of the differences between real and simulated soc...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملIdentification and Functional Prediction of Long Non-Coding RNAs Responsive to Drought stress in Lens culinaris L.
Drought stress is one of the main environmental factors that affects growth and productivity of crop plants, including lentil. In the course of evolution evolution, crucial genetic regulations mediated by non-coding RNAs (ncRNAs) have emerged in plant in response to drought and other abiotic stresses. In the present study, after identifying lncRNAs within the expression profile of lentil, RNA-s...
متن کاملUsing the Protein-protein Interaction Network to Identifying the Biomarkers in Evolution of the Oocyte
Background Oocyte maturity includes nuclear and cytoplasmic maturity, both of which are important for embryo fertilization. The development of oocyte is not limited to the period of follicular growth, and starts from the embryonic period and continues throughout life. In this study, for the purpose of evaluating the effect of the FSH hormone on the expression of genes, GEO access codes for this...
متن کاملOPTIMAL DESIGN OF WATER DISTRIBUTION SYSTEM USING CENTRAL FORCE OPTIMIZATION AND DIFFERENTIAL EVOLUTION
For any agency dealing with the design of the water distribution network, an economic design will be an objective. In this research, Central Force Optimization (CFO) and Differential Evolution (DE) algorithm were used to optimize Ismail Abad water Distribution network. Optimization of the network has been evaluated by developing an optimization model based on CFO and DE algorithm in MATLAB and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013