A Sensitivity Analysis of Evolutionary Algorithms in Generating Secure Configurations

被引:3
|
作者
Dass, Shuvalaxmi [1 ]
Namin, Akbar Siami [1 ]
机构
[1] Texas Tech Univ, Comp Sci Dept, Lubbock, TX 79409 USA
基金
美国国家科学基金会;
关键词
Cyber-Physical Systems; security; Genetic Algorithm; Particle Swarm Optimization; Sensitivity Analysis;
D O I
10.1109/BigData50022.2020.9378307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth of Cyber-physical Systems (CPS) has been increased in recent years. This has led to the coupling of highly complex cyber-physical components. With the integration of such complex components, new security challenges have emerged. Studies involving security issues in CPS have been quite difficult to be generalized due to the presence of heterogeneity and the diversity of the CPS components. These systems are subject to various vulnerabilities, threats and attacks, as a consequence of complex versions of CPS being introduced over time. This paper deals with vulnerabilities caused due to improper configurations in the software component of cyber-physical systems. Evolutionary algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) can be employed to adequately test the underlying software for certain categories of vulnerabilities. This paper provides a detailed sensitivity analysis of these evolutionary algorithms in order to find out whether changing parameters involved in tuning these algorithms affect the overall performance. This analysis is based on the estimate of the number of generation of secure vulnerability pattern vectors under the variation of different parameters. The results indicate that while there is no evidence of influential parameters in Genetic Algorithms (i.e., mutation rate and population size), changes in the parameters involved in Particle Swarm Optimization algorithms (i.e., velocity rate and fitness range) have some positive impacts on the number of secure configurations generated.
引用
收藏
页码:2065 / 2072
页数:8
相关论文
共 50 条
  • [41] Sensitivity Analysis in Constrained Evolutionary Optimization
    Schulte, Julian
    Nissen, Volker
    GECCO'20: PROCEEDINGS OF THE 2020 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2020, : 894 - 902
  • [42] Switch Analysis for Running Time Analysis of Evolutionary Algorithms
    Yu, Yang
    Qian, Chao
    Zhou, Zhi-Hua
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2015, 19 (06) : 777 - 792
  • [43] Sensitivity Analysis of Wind Power Generating System
    Khatoon, Shahida
    Ibraheem
    Ehtesham, Reshma
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1316 - 1321
  • [44] AN ALGORITHM FOR GENERATING ISING CONFIGURATIONS
    PEREIRA, JMS
    COMMUNICATIONS OF THE ACM, 1969, 12 (10) : 562 - &
  • [45] Examining the Possibilities: Generating Alternative Watershed-Scale BMP Designs with Evolutionary Algorithms
    Kimberly S. Artita
    Prakash Kaini
    John W. Nicklow
    Water Resources Management, 2013, 27 : 3849 - 3863
  • [46] Examining the Possibilities: Generating Alternative Watershed-Scale BMP Designs with Evolutionary Algorithms
    Artita, Kimberly S.
    Kaini, Prakash
    Nicklow, John W.
    WATER RESOURCES MANAGEMENT, 2013, 27 (11) : 3849 - 3863
  • [47] Runtime Analysis of Evolutionary Algorithms: Basic Introduction
    Lehre, Per Kristian
    Oliveto, Pietro S.
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 662 - 693
  • [48] Design and analysis of migration in parallel evolutionary algorithms
    Jörg Lässig
    Dirk Sudholt
    Soft Computing, 2013, 17 : 1121 - 1144
  • [49] Evolutionary algorithms application analysis in biometric systems
    Goranin N.
    Cenys A.
    Journal of Engineering Science and Technology Review, 2010, 3 (01) : 70 - 79
  • [50] Different scenarios for survival analysis of evolutionary algorithms
    Santana, Roberto
    Lozano, Jose A.
    PROCEEDINGS OF THE 2017 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'17), 2017, : 825 - 832