Analysis of Evolutionary Algorithm based Optimization for Cyber Threat Modeling

被引:0
|
作者
Wright, Joseph Grady, V [1 ]
Sevil, Hakki Erhan [2 ]
Francia, Guillermo, III [3 ]
Youssef, Tarek [4 ]
Ghosh, Tirthankar [3 ]
Hall, Gregory [3 ]
机构
[1] UWF, Dept Math & Stat, Pensacola, FL 32514 USA
[2] UWF, Dept Intelligent Syst & Robot, Pensacola, FL 32502 USA
[3] UWF, Ctr Cybersecur, Pensacola, FL 32502 USA
[4] UWF, Dept Elect & Comp Engn, Pensacola, FL 32514 USA
来源
SOUTHEASTCON 2022 | 2022年
关键词
Cyber Threat Modeling; Genetic Algorithm; Evolutionary Algorithms; Applied Optimization; Cyber Security; GENETIC ALGORITHM;
D O I
10.1109/SoutheastCon48659.2022.9764131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This study utilizes a type of genetic algorithm (GA) called trait-based heterogeneous populations plus (TbHP+) for evaluating cyber threat model equations. TbHP+ uses immunity and instinct to create a type of memory concept that then offers populations with more efficient directives. Additionally, TbHP+ uses the varying number of individuals based on "traits" and can change them during the search process therefore allowing the size of a population to automatically adapt. The population size is based on specific characteristics such as character fitness and credit for immunity. The TbHP+ model in this study was first tested and compared to the classical GA model regarding minimum error performance for well-known mathematical test functions: Rastrigin's 6th test function, De Jong's 1st Test function, and Schwefel's 7th test function. Further, TbHP+ and classical GA were applied to a cyber threat model, namely the internet worm model. In both analysis, the TbHP+ algorithm performs better than classical GA algorithm, when compared to the minimum error performance in test functions and to the objective function of the internet worm model.
引用
收藏
页码:751 / 756
页数:6
相关论文
共 50 条
  • [1] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [2] Optimization Algorithm of Evolutionary Design of Circuits Based on Genetic Algorithm
    Song, Xuejun
    Cui, Yanli
    Li, Aiting
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 336 - 339
  • [3] Bell-curve based evolutionary optimization algorithm
    Sobieszczanski-Sobieski J.
    Laba K.
    Kincaid R.
    Structural optimization, 1999, 18 (4) : 264 - 276
  • [4] A Bayesian Optimization-based Evolutionary Algorithm for Flexible Job Shop Scheduling
    Sun, Lu
    Lin, Lin
    Wang, Yan
    Gen, Mitsuo
    Kawakami, Hiroshi
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 521 - 526
  • [5] Evolutionary Algorithm Based Structural Optimization for Patch Antenna Design and its Performance Analysis
    Sudhakaran, Gopika
    Kandipati, Bindu
    Surya, Bhuvan G.
    Shree, V. Karthikhaa
    Sivaprasad, M.
    Jayakumar, M.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2189 - 2192
  • [6] CYLINDRICAL CONSTRAINT EVOLUTIONARY ALGORITHM FOR MULTIOBJECTIVE OPTIMIZATION
    Erfani, Tohid
    Utyuzhnikov, Sergei V.
    ECTA 2011/FCTA 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION THEORY AND APPLICATIONS AND INTERNATIONAL CONFERENCE ON FUZZY COMPUTATION THEORY AND APPLICATIONS, 2011, : 184 - 189
  • [7] An alopex based evolutionary optimization algorithm
    Institute of Automation, East China University of Science and Technology, Shanghai 200237, China
    Moshi Shibie yu Rengong Zhineng, 2009, 3 (452-456):
  • [8] Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System
    Javaid, Ahmad Y.
    Sun, Weiqing
    Devabhaktuni, Vijay K.
    Alam, Mansoor
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 585 - 590
  • [9] STRIDE-based Threat Modeling for Cyber-Physical Systems
    Khan, Rafiullah
    McLaughlin, Kieran
    Laverty, David
    Sezer, Sakir
    2017 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2017,
  • [10] Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
    Sufi, Fahim
    Alsulami, Musleh
    MATHEMATICS, 2025, 13 (04)