Discovering How to Attack a System

Fabrizio Baiardi, Daria Maggi, Daria Maggi, Mauro Passacantando

2022

Abstract

We evaluate the performance of a genetic algorithm to discover the best set of rules to implement an intrusion against an ICT network. The rules determine how the attacker selects and sequentializes its actions to implement an intrusion. The fitness of a set of rules is assigned after exploiting it in an intrusion. The evaluation of the distinct sets of rules in the populations the algorithm considers requires multiple intrusions. To avoid the resulting noise on the ICT network, the intrusions target a digital twin of the network. We present a preliminary experimental results that supports the feasibility of the proposed solution.

Download


Paper Citation


in Harvard Style

Baiardi F., Maggi D. and Passacantando M. (2022). Discovering How to Attack a System. In Proceedings of the 19th International Conference on Security and Cryptography - Volume 1: SECRYPT, ISBN 978-989-758-590-6, pages 548-553. DOI: 10.5220/0011270000003283


in Bibtex Style

@conference{secrypt22,
author={Fabrizio Baiardi and Daria Maggi and Mauro Passacantando},
title={Discovering How to Attack a System},
booktitle={Proceedings of the 19th International Conference on Security and Cryptography - Volume 1: SECRYPT,},
year={2022},
pages={548-553},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011270000003283},
isbn={978-989-758-590-6},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 19th International Conference on Security and Cryptography - Volume 1: SECRYPT,
TI - Discovering How to Attack a System
SN - 978-989-758-590-6
AU - Baiardi F.
AU - Maggi D.
AU - Passacantando M.
PY - 2022
SP - 548
EP - 553
DO - 10.5220/0011270000003283