Evolving Finite-State Machine Strategies for Protecting Resources

  • William M. Spears
  • Diana F. Gordon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1932)

Abstract

We are becoming increasingly dependent on large intercon- nected networks for the control of our resources. One important issue is resource protection strategies in the event of failures and/or attacks. To address this issue we investigated the effectiveness of evolving finite-state machine (FSM) strategies for winning against an adversary in a challenging Competition for Resources simulation. Although preliminary results were promising, unproductive cyclic behavior lowered performance. We then augmented evolution with an algorithm that rapidly detects and removes this cyclic behavior, thereby improving performance dramatically.

Keywords

Good Individual Prefer Action Accessible State Virus Version Information Warfare 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Carmel, D. and Markovitch, S. (1996) Learning models of intelligent agents. Proceedings of the Thirteenth National Conference on Artificial Intelligence.Google Scholar
  2. 2.
    De Jong, K., Spears, W. and Gordon, D. (1993) Using genetic algorithms for concept learning. Machine Learning Journal, 13 2/3.Google Scholar
  3. 3.
    Denning, D. (1999) Information Warfare and Security. Addison-Wesley, NY.Google Scholar
  4. 4.
    Fogel, L. (1999) Intelligence Through Simulated Evolution: Forty Years of Evolutionary Programming. Wiley Series on Intelligent Systems.Google Scholar
  5. 5.
    Fogel, L., Owens, A., and Walsh, M. (1966) Artificial Intelligence Through Simulated Evolution. John Wiley and Sons, Inc., New York.Google Scholar
  6. 6.
    Gordon, D., Spears, W., Sokolsky, O., and Lee, I. (1999) Distributed spatial control, global monitoring and steering of mobile physical agents. Proceedings of the IEEE International Conference on Information, Intelligence, and Systems.Google Scholar
  7. 7.
    Grefenstette, J. and Fitzpatrick, J. (1985) Genetic search with approximate function evaluations. Proceedings of the Int’l Conference on Genetic Algorithms.Google Scholar
  8. 8.
    Holland, J. (1975) Adaptation in Natural and Artificial Systems. University of Michigan Press.Google Scholar
  9. 9.
    Hopcroft, J. and Ullman, J. (1979) Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Menlo Park.Google Scholar
  10. 10.
    Jefferson, D., Collins, R., Cooper, C., Dyer, M., Flowers, M., Korf, R., Taylor, C. and Wang, A. (1991) Evolution as a theme in artificial life: the Genesys/Tracker system. Proceedings of Artificial Life II.Google Scholar
  11. 11.
    Levy, S. and Stone, B. (2000) Hunting the hackers. Newsweek, February 21.Google Scholar
  12. 12.
    Spears, W. and De Jong, K. (1991) On the virtues of parameterized uniform crossover. Proceedings of the International Conference on Genetic Algorithms.Google Scholar
  13. 13.
    Spears. W. and Gordon, D. (2000) Evolution of strategies for resource protection problems. Submitted to A. Ghosh and S. Tsutsui, editors, Theory and Application of Evolutionary Computation: Recent Trends. Springer Verlag.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • William M. Spears
    • 1
  • Diana F. Gordon
    • 1
  1. 1.AI Center, Naval Research LaboratoryUSA

Personalised recommendations