A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations

被引:3
|
作者
Dass, Shuvalaxmi [1 ]
Namin, Akbar Siami [1 ]
机构
[1] Texas Tech Univ, Comp Sci Dept, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cyber-Physical Systems; security; Genetic Algorithm; Particle Swarm Optimization; Sensitivity Analysis;
D O I
10.1109/BigData50022.2020.9378307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth of Cyber-physical Systems (CPS) has been increased in recent years. This has led to the coupling of highly complex cyber-physical components. With the integration of such complex components, new security challenges have emerged. Studies involving security issues in CPS have been quite difficult to be generalized due to the presence of heterogeneity and the diversity of the CPS components. These systems are subject to various vulnerabilities, threats and attacks, as a consequence of complex versions of CPS being introduced over time. This paper deals with vulnerabilities caused due to improper configurations in the software component of cyber-physical systems. Evolutionary algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) can be employed to adequately test the underlying software for certain categories of vulnerabilities. This paper provides a detailed sensitivity analysis of these evolutionary algorithms in order to find out whether changing parameters involved in tuning these algorithms affect the overall performance. This analysis is based on the estimate of the number of generation of secure vulnerability pattern vectors under the variation of different parameters. The results indicate that while there is no evidence of influential parameters in Genetic Algorithms (i.e., mutation rate and population size), changes in the parameters involved in Particle Swarm Optimization algorithms (i.e., velocity rate and fitness range) have some positive impacts on the number of secure configurations generated.
引用
收藏
页码:2065 / 2072
页数:8
相关论文
共 50 条
  • [1] Reinforcement Learning for Generating Secure Configurations
    Dass, Shuvalaxmi
    Siami Namin, Akbar
    ELECTRONICS, 2021, 10 (19)
  • [2] GENETIC ALGORITHMS FOR GENERATING MINIMUM PATH CONFIGURATIONS
    SHARPE, PK
    CHALMERS, AG
    GREENWOOD, A
    MICROPROCESSORS AND MICROSYSTEMS, 1995, 19 (01) : 9 - 14
  • [3] Analysis and Visualization of the Impact of Different Parameter Configurations on the Behavior of Evolutionary Algorithms
    Wagner, Stefan
    Beham, Andreas
    Affenzeller, Michael
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2017, PT I, 2018, 10671 : 439 - 446
  • [4] Dynamic Airspace Configurations Generated by Evolutionary Algorithms
    Sergeeva, Marina
    Delahaye, Daniel
    Zerrouki, Leila
    Schede, Nick
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [5] DYNAMIC AIRSPACE CONFIGURATIONS GENERATED BY EVOLUTIONARY ALGORITHMS
    Sergeeva, Marina
    Delahaye, Daniel
    Zerrouki, Leila
    Schede, Nick
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [6] Sensitivity Analysis in the Optimal Sizing of Analog ICs by Evolutionary Algorithms
    Guerra-Gomez, I.
    Tlelo-Cuautle, E.
    Gerardo de la Fraga, L.
    2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2013, : 3161 - 3165
  • [7] Evolutionary algorithms aided by sensitivity information
    Burczynski, T
    Orantek, P
    ARTIFICIAL NEURAL NETS AND GENETIC ALGORITHMS, 2001, : 272 - 275
  • [8] LOOPLESS ALGORITHMS FOR GENERATING PERMUTATIONS, COMBINATIONS, AND OTHER COMBINATORIAL CONFIGURATIONS
    EHRLICH, G
    JOURNAL OF THE ACM, 1973, 20 (03) : 500 - 513
  • [9] On the Strengths of Pure Evolutionary Algorithms in Generating Adversarial Examples
    Bartlett, Antony
    Liem, Cynthia C. S.
    Panichella, Annibale
    2023 IEEE/ACM INTERNATIONAL WORKSHOP ON SEARCH-BASED AND FUZZ TESTING, SBFT, 2023, : 1 - 8
  • [10] Analysis of Maze Generating Algorithms
    Gabrovsek, Peter
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2019, 15 (01):