In this work, we investigate the ability of genetic programming techniques to evolve valid network patterns, while avoiding detectability by obfuscating the intent of the traffic. In order to validate our system's capabilities, we choose to evolve a port scan attack while running the packets through an Intrusion Detection System (IDS). In turn, the evolutionary process uses feedback such that it minimizes the alarms raised while port scanning across a network range. Results build off of previous work allow us to further analyze and understand what the role of introns, code bloat, play in the systems ability to reduce the detectability of it malicious behaviour. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Laroche, P., Zincir-Heywood, N., & Heywood, M. I. (2010). Using code bloat to obfuscate evolved network traffic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6025 LNCS, pp. 101–110). Springer Verlag. https://doi.org/10.1007/978-3-642-12242-2_11
Mendeley helps you to discover research relevant for your work.