Skip to main content

What Is Your MOVE: Modeling Adversarial Network Environments

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12104))

  • 1224 Accesses

Abstract

Finding optimal adversarial dynamics between defenders and attackers in large network systems is a complex problem one can approach from several perspectives. The results obtained are often not satisfactory since they either concentrate on only one party or run very simplified scenarios that are hard to correlate with realistic settings. To truly find which are the most robust defensive strategies, the adaptive attacker ecosystem must be given as many degrees of freedom as possible, to model real attacking scenarios accurately. We propose a coevolutionary-based simulator called MOVE that can evolve both attack and defense strategies. To test it, we investigate several different but realistic scenarios, taking into account features such as network topology and possible applications in the network. The results show that the evolved strategies far surpass randomly generated strategies. Finally, the evolved strategies can help us to reach some more general conclusions for both attacker and defender sides.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Move simulator (2019). https://github.com/MOVESimulator/

  2. Achleitner, S., La Porta, T., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R.: Cyber deception: virtual networks to defend insider reconnaissance. In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2016, pp. 57–68. ACM, New York (2016)

    Google Scholar 

  3. Achleitner, S., La Porta, T., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R.: Reconnaissance deception system prototype implementation (2016). https://github.com/deceptionsystem/master

  4. Duan, Q., Al-Shaer, E., Haadi Jafarian, J.: Efficient random route mutation considering flow and network constraints. In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, 14–16 October 2013, pp. 260–268. IEEE (2013)

    Google Scholar 

  5. Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2003)

    Book  Google Scholar 

  6. Garcia, D., Lugo, A.E., Hemberg, E., O’Reilly, U.-M.: Investigating coevolutionary archive based genetic algorithms on cyber defense networks. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2017, pp. 1455–1462. ACM, New York (2017)

    Google Scholar 

  7. Hemberg, E., Zipkin, J.R., Skowyra, R.W., Wagner, N., O’Reilly, U.-M.: Adversarial co-evolution of attack and defense in a segmented computer network environment. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2018, pp. 1648–1655. ACM, New York (2018)

    Google Scholar 

  8. Kelly, J., DeLaus, M., Hemberg, E., O’Reilly, U.: Adversarially adapting deceptive views and reconnaissance scans on a software defined network. In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 49–54, April 2019

    Google Scholar 

  9. Lyon, G.F.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure, Los Angeles (2009)

    Google Scholar 

  10. Miller, J.H.: The coevolution of automata in the repeated prisoner’s dilemma. J. Econ. Behav. Organ. 29(1), 87–112 (1996)

    Article  Google Scholar 

  11. Panjwani, S., Tan, S., Jarrin, K.M., Cukier, M.: An experimental evaluation to determine if port scans are precursors to an attack. In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), pp. 602–611, June 2005

    Google Scholar 

  12. Rush, G., Tauritz, D.R., Kent, A.D.: Coevolutionary agent-based network defense lightweight event system (CANDLES). In: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion 2015, pp. 859–866. ACM, New York (2015)

    Google Scholar 

  13. Prado Sánchez, D.: Visualizing adversaries: transparent pooling approaches for decision support in cybersecurity. M. Eng, thesis, Massachusetts Institute of Technology (2018)

    Google Scholar 

  14. Symantec: Preparing for a cyber attack, January 2017

    Google Scholar 

  15. Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)

    Article  Google Scholar 

  16. Winterrose, M.L., Carter, K.M.: Strategic evolution of adversaries against temporal platform diversity active cyber defenses. In: Proceedings of the 2014 Symposium on Agent Directed Simulation, ADS 2014, pp. 9:1–9:9. Society for Computer Simulation International, San Diego (2014)

    Google Scholar 

  17. Winterrose, M.L., Carter, K.M., Wagner, N., Streilein, W.W.: Adaptive attacker strategy development against moving target cyber defenses. CoRR, abs/1407.8540 (2014)

    Google Scholar 

  18. Zaffarano, K., Taylor, J., Hamilton, S.: A quantitative framework for moving target defense effectiveness evaluation. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 3–10. ACM, New York (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Karlo Knezevic , Stjepan Picek , Domagoj Jakobovic or Julio Hernandez-Castro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Knezevic, K., Picek, S., Jakobovic, D., Hernandez-Castro, J. (2020). What Is Your MOVE: Modeling Adversarial Network Environments. In: Castillo, P.A., Jiménez Laredo, J.L., Fernández de Vega, F. (eds) Applications of Evolutionary Computation. EvoApplications 2020. Lecture Notes in Computer Science(), vol 12104. Springer, Cham. https://doi.org/10.1007/978-3-030-43722-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43722-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43721-3

  • Online ISBN: 978-3-030-43722-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics