A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations

被引:3
作者
Dass, Shuvalaxmi [1 ]
Namin, Akbar Siami [1 ]
机构
[1] Texas Tech Univ, Comp Sci Dept, Lubbock, TX 79409 USA
来源
2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2020年
基金
美国国家科学基金会;
关键词
Cyber-Physical Systems; security; Genetic Algorithm; Particle Swarm Optimization; Sensitivity Analysis;
D O I
10.1109/BigData50022.2020.9378307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth of Cyber-physical Systems (CPS) has been increased in recent years. This has led to the coupling of highly complex cyber-physical components. With the integration of such complex components, new security challenges have emerged. Studies involving security issues in CPS have been quite difficult to be generalized due to the presence of heterogeneity and the diversity of the CPS components. These systems are subject to various vulnerabilities, threats and attacks, as a consequence of complex versions of CPS being introduced over time. This paper deals with vulnerabilities caused due to improper configurations in the software component of cyber-physical systems. Evolutionary algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) can be employed to adequately test the underlying software for certain categories of vulnerabilities. This paper provides a detailed sensitivity analysis of these evolutionary algorithms in order to find out whether changing parameters involved in tuning these algorithms affect the overall performance. This analysis is based on the estimate of the number of generation of secure vulnerability pattern vectors under the variation of different parameters. The results indicate that while there is no evidence of influential parameters in Genetic Algorithms (i.e., mutation rate and population size), changes in the parameters involved in Particle Swarm Optimization algorithms (i.e., velocity rate and fitness range) have some positive impacts on the number of secure configurations generated.
引用
收藏
页码:2065 / 2072
页数:8
相关论文
共 20 条
  • [1] [Anonymous], 2004, IEEE C EVOL COMPUTAT
  • [2] Borna Keivan, 2014, INT J COMPUTER SCI E, V4, P47
  • [3] Defining a standard for particle swarm optimization
    Bratton, Daniel
    Kennedy, James
    [J]. 2007 IEEE SWARM INTELLIGENCE SYMPOSIUM, 2007, : 120 - +
  • [4] Carr J., 2014, An Introduction to Genetic Algorithms
  • [5] Detecting Phishing Websites through Deep Reinforcement Learning
    Chatterjee, Moitrayee
    Namin, Akbar Siami
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2019, : 227 - 232
  • [6] Crouse M.B., 2011, P 54 IEEE INT MIDWES, P1
  • [7] Crouse Michael B., IMPROVING DIVERSITY
  • [8] Evolutionary Algorithms for Vulnerability Coverage
    Dass, Shuvalaxmi
    Namin, Akbar Siami
    [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1795 - 1801
  • [9] Dass S, 2020, PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), P540, DOI [10.1145/3341105.3374099, 10.1445/3341405.3374099]
  • [10] Do VL, 2015, EUR SIGNAL PR CONF, P2261, DOI 10.1109/EUSIPCO.2015.7362787