Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity

Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.

Bibliographic Details
Main Author: Prado Sánchez, Daniel
Other Authors: Una-May O'Reilly and Erik Hemberg.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2018
Subjects:
Online Access:http://hdl.handle.net/1721.1/119722
_version_ 1811091637360656384
author Prado Sánchez, Daniel
author2 Una-May O'Reilly and Erik Hemberg.
author_facet Una-May O'Reilly and Erik Hemberg.
Prado Sánchez, Daniel
author_sort Prado Sánchez, Daniel
collection MIT
description Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
first_indexed 2024-09-23T15:05:33Z
format Thesis
id mit-1721.1/119722
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T15:05:33Z
publishDate 2018
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1197222019-04-12T20:09:46Z Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity Prado Sánchez, Daniel Una-May O'Reilly and Erik Hemberg. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Cataloged from student-submitted PDF version of thesis. Includes bibliographical references (pages 49-50). Using coevolutionary algorithms to find solutions to problems is a powerful search technique but once solutions are identified it can be difficult for a decision maker to select a solution to deploy. ESTABLO runs multiple competitive coevolutionary algorithm variants independently, in parallel, and then combines their test and solution results at the final generation into a compendium. From there, it re-evaluates each solution, according to three different measurements, on every test as well as on a set of unseen tests. For a decision maker, it finally identifies top solutions using various metrics and visualizes them in the context of other solutions. However, it can be difficult to decide on which coevolutionary algorithms to run individually or use in ESTABLO. A coevolutionary variant, POOLING, was then created using this same principle of combining multiple variants. POOLING runs competitive coevolutionary algorithm variants, combines their solutions after every generation, and seeds the next generation with the top solutions found. ESTABLO (with POOLING as one of its variants) is demonstrated on multiple cyber security related problems. We found that using ESTABLO was beneficial to most problems as different variants dominated in different scenarios. We also found that POOLING was able to consistently produce individuals that performed well against adversaries and in the context of all of their peers. by Daniel Prado Sánchez. M. Eng. 2018-12-18T19:47:16Z 2018-12-18T19:47:16Z 2018 2018 Thesis http://hdl.handle.net/1721.1/119722 1078639023 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 50 pages application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Prado Sánchez, Daniel
Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title_full Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title_fullStr Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title_full_unstemmed Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title_short Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity
title_sort visualizing adversaries transparent pooling approaches for decision support in cybersecurity
topic Electrical Engineering and Computer Science.
url http://hdl.handle.net/1721.1/119722
work_keys_str_mv AT pradosanchezdaniel visualizingadversariestransparentpoolingapproachesfordecisionsupportincybersecurity