Using code bloat to obfuscate evolved network traffic

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work, we investigate the ability of genetic programming techniques to evolve valid network patterns, while avoiding detectability by obfuscating the intent of the traffic. In order to validate our system's capabilities, we choose to evolve a port scan attack while running the packets through an Intrusion Detection System (IDS). In turn, the evolutionary process uses feedback such that it minimizes the alarms raised while port scanning across a network range. Results build off of previous work allow us to further analyze and understand what the role of introns, code bloat, play in the systems ability to reduce the detectability of it malicious behaviour. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Laroche, P., Zincir-Heywood, N., & Heywood, M. I. (2010). Using code bloat to obfuscate evolved network traffic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6025 LNCS, pp. 101–110). Springer Verlag. https://doi.org/10.1007/978-3-642-12242-2_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free