Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/119722 |
_version_ | 1811091637360656384 |
---|---|
author | Prado Sánchez, Daniel |
author2 | Una-May O'Reilly and Erik Hemberg. |
author_facet | Una-May O'Reilly and Erik Hemberg. Prado Sánchez, Daniel |
author_sort | Prado Sánchez, Daniel |
collection | MIT |
description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. |
first_indexed | 2024-09-23T15:05:33Z |
format | Thesis |
id | mit-1721.1/119722 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T15:05:33Z |
publishDate | 2018 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1197222019-04-12T20:09:46Z Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity Prado Sánchez, Daniel Una-May O'Reilly and Erik Hemberg. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Cataloged from student-submitted PDF version of thesis. Includes bibliographical references (pages 49-50). Using coevolutionary algorithms to find solutions to problems is a powerful search technique but once solutions are identified it can be difficult for a decision maker to select a solution to deploy. ESTABLO runs multiple competitive coevolutionary algorithm variants independently, in parallel, and then combines their test and solution results at the final generation into a compendium. From there, it re-evaluates each solution, according to three different measurements, on every test as well as on a set of unseen tests. For a decision maker, it finally identifies top solutions using various metrics and visualizes them in the context of other solutions. However, it can be difficult to decide on which coevolutionary algorithms to run individually or use in ESTABLO. A coevolutionary variant, POOLING, was then created using this same principle of combining multiple variants. POOLING runs competitive coevolutionary algorithm variants, combines their solutions after every generation, and seeds the next generation with the top solutions found. ESTABLO (with POOLING as one of its variants) is demonstrated on multiple cyber security related problems. We found that using ESTABLO was beneficial to most problems as different variants dominated in different scenarios. We also found that POOLING was able to consistently produce individuals that performed well against adversaries and in the context of all of their peers. by Daniel Prado Sánchez. M. Eng. 2018-12-18T19:47:16Z 2018-12-18T19:47:16Z 2018 2018 Thesis http://hdl.handle.net/1721.1/119722 1078639023 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 50 pages application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Prado Sánchez, Daniel Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title | Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title_full | Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title_fullStr | Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title_full_unstemmed | Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title_short | Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity |
title_sort | visualizing adversaries transparent pooling approaches for decision support in cybersecurity |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/119722 |
work_keys_str_mv | AT pradosanchezdaniel visualizingadversariestransparentpoolingapproachesfordecisionsupportincybersecurity |