Advertisement

Evolutionary Design of Attack Strategies

  • Jiří Kůr
  • Václav Matyáš
  • Petr Švenda
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)

Abstract

We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less).

Keywords

Wireless Sensor Network Evolutionary Algorithm Intrusion Detection System Malicious Node Evolutionary Design 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [ACP04]
    Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004, pp. 206–215. IEEE Computer Society, Washington, DC (2004)CrossRefGoogle Scholar
  2. [BHSS03]
    Blum, B., He, T., Son, S., Stankovic, J.: IGF: A state-free robust communication protocol for wireless sensor networks. Technical Report, CS-2003-11. Department of Computer Science, University of Virginia, USA (2003)Google Scholar
  3. [CPS03]
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP 2003, pp. 197–214. IEEE Computer Society, Washington, DC (2003)Google Scholar
  4. [CPS04]
    Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks, pp. 277–303 (2004)Google Scholar
  5. [CS05]
    Cvrcek, D., Svenda, P.: Smart dust security - key infection revisited. In: Security and Trust Management 2005, Italy. ENTCS, pp. 10–23 (2005)Google Scholar
  6. [DDHV03]
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, pp. 42–51 (2003)Google Scholar
  7. [EG02]
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, pp. 41–47 (2002)Google Scholar
  8. [FL06]
    Fogla, P., Lee, W.: Evading network anomaly detection systems: formal reasoning and practical techniques. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 59–68. ACM, New York (2006)CrossRefGoogle Scholar
  9. [LLL+04]
    Lee, J.-K., Lee, M.-W., Lee, J.-S., Chi, S.-D., Ohn, S.-Y.: Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. In: Kim, T.G. (ed.) AIS 2004. LNCS (LNAI), vol. 3397, pp. 380–389. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. [LN03]
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM Press, New York (2003)CrossRefGoogle Scholar
  11. [Mea03]
    Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1), 44–54 (2003)CrossRefGoogle Scholar
  12. [MGL+06]
    Massicotte, F., Gagnon, F., Labiche, Y., Briand, L., Couture, M.: Automatic evaluation of intrusion detection systems. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 361–370. IEEE Computer Society, Washington, DC (2006)Google Scholar
  13. [PMM03]
    Di Pietro, R., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, pp. 62–71 (2003)Google Scholar
  14. [RJM04]
    Rubin, S., Jha, S., Miller, B.P.: Automatic generation and analysis of nids attacks. In: ACSAC 2004: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 28–38. IEEE Computer Society, Washington, DC (2004)Google Scholar
  15. [SHJ+02]
    Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy, p. 273. IEEE Computer Society, Washington, DC (2002)CrossRefGoogle Scholar
  16. [SM07a]
    Svenda, P., Matyas, V.: Authenticated key exchange with group support for wireless sensor networks. In: WSNS 2007: Proceedings of the 3rd Wireless and Sensor Network Security Workshop, pp. 21–26. IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  17. [SM07b]
    Svenda, P., Matyas, V.: Key distribution and secrecy amplification in wireless sensor networks. Technical Report, FIMU-RS-2007-05, Brno, ČR, Masaryk University (2007)Google Scholar
  18. [Tho98]
    Thompson, A.: Hardware Evolution: Automatic design of electronic circuits in reconfigurable hardware by artificial evolution. Distinguished dissertation series. Springer (1998)Google Scholar
  19. [vSM09]
    Švenda, P., Sekanina, L., Matyáš, V.: Evolutionary design of secrecy amplification protocols. In: ACM WiSec 2009, Zurich, Switzerland (2009)Google Scholar
  20. [YCLZ01]
    Ye, F., Chen, A., Liu, S., Zhang, L.: A scalable solution to minimum cost forwarding in large sensor networks. In: Proceedings of Tenth International Conference on Computer Communications and Networks, pp. 304–309 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jiří Kůr
    • 1
  • Václav Matyáš
    • 1
  • Petr Švenda
    • 1
  1. 1.Masaryk UniversityBrnoCzech Republic

Personalised recommendations