ISMIS 2000: Foundations of Intelligent Systems pp 166-175 | Cite as
Evolving Finite-State Machine Strategies for Protecting Resources
Abstract
We are becoming increasingly dependent on large intercon- nected networks for the control of our resources. One important issue is resource protection strategies in the event of failures and/or attacks. To address this issue we investigated the effectiveness of evolving finite-state machine (FSM) strategies for winning against an adversary in a challenging Competition for Resources simulation. Although preliminary results were promising, unproductive cyclic behavior lowered performance. We then augmented evolution with an algorithm that rapidly detects and removes this cyclic behavior, thereby improving performance dramatically.
Keywords
Good Individual Prefer Action Accessible State Virus Version Information WarfarePreview
Unable to display preview. Download preview PDF.
References
- 1.Carmel, D. and Markovitch, S. (1996) Learning models of intelligent agents. Proceedings of the Thirteenth National Conference on Artificial Intelligence.Google Scholar
- 2.De Jong, K., Spears, W. and Gordon, D. (1993) Using genetic algorithms for concept learning. Machine Learning Journal, 13 2/3.Google Scholar
- 3.Denning, D. (1999) Information Warfare and Security. Addison-Wesley, NY.Google Scholar
- 4.Fogel, L. (1999) Intelligence Through Simulated Evolution: Forty Years of Evolutionary Programming. Wiley Series on Intelligent Systems.Google Scholar
- 5.Fogel, L., Owens, A., and Walsh, M. (1966) Artificial Intelligence Through Simulated Evolution. John Wiley and Sons, Inc., New York.Google Scholar
- 6.Gordon, D., Spears, W., Sokolsky, O., and Lee, I. (1999) Distributed spatial control, global monitoring and steering of mobile physical agents. Proceedings of the IEEE International Conference on Information, Intelligence, and Systems.Google Scholar
- 7.Grefenstette, J. and Fitzpatrick, J. (1985) Genetic search with approximate function evaluations. Proceedings of the Int’l Conference on Genetic Algorithms.Google Scholar
- 8.Holland, J. (1975) Adaptation in Natural and Artificial Systems. University of Michigan Press.Google Scholar
- 9.Hopcroft, J. and Ullman, J. (1979) Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Menlo Park.Google Scholar
- 10.Jefferson, D., Collins, R., Cooper, C., Dyer, M., Flowers, M., Korf, R., Taylor, C. and Wang, A. (1991) Evolution as a theme in artificial life: the Genesys/Tracker system. Proceedings of Artificial Life II.Google Scholar
- 11.Levy, S. and Stone, B. (2000) Hunting the hackers. Newsweek, February 21.Google Scholar
- 12.Spears, W. and De Jong, K. (1991) On the virtues of parameterized uniform crossover. Proceedings of the International Conference on Genetic Algorithms.Google Scholar
- 13.Spears. W. and Gordon, D. (2000) Evolution of strategies for resource protection problems. Submitted to A. Ghosh and S. Tsutsui, editors, Theory and Application of Evolutionary Computation: Recent Trends. Springer Verlag.Google Scholar