Abstract
The motivation for this presentation came from our work on trying evolutionary approaches on building protocols for security. We eventually came to an understanding that evolutionary approaches help us in finding problems that we would not be aware of, and that generated the idea of trying evolutionary approaches not to generate new protocols, but to generate attacks.
The basic motivation is that there is a fundamental symmetry between the attacker and the defender, in the sense that an attacker needs to only find one attack path to successfully compromise the system, where a defender must be able to secure all of them to have a secure system. So by this analogy, the brute force search over the space of all possible attack paths is more suitable for a defender, whereas some kind of informed search where not all possibilities in the search space are examined is more suitable for an attacker.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Švenda, P. (2013). Evolutionary Design of Attack Strategies. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)