Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470074
|View full text |Cite
|
Sign up to set email alerts
|

AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm

Abstract: Cyberattacks targeting modern network infrastructures are increasing in number and impact. This growing phenomenon emphasizes the central role of cybersecurity and, in particular, the reaction against ongoing threats targeting assets within the protected system. Such centrality is reflected in the literature, where several works have been presented to propose full-fledged reaction methodologies to tackle offensive incidents' consequences. In this direction, the work in [18] developed an immuno-based response a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 27 publications
(41 reference statements)
0
0
0
Order By: Relevance
“…They, however, suggested a context-aware stop condition based on experimental outcomes and authors' subjective beliefs. In [17] the authors further improved the previous work by proposing an AISGA method leveraging a GA to optimize the selection of input parameters of the AIS method by minimizing the global risk and the execution time of the method.…”
Section: Methodological Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…They, however, suggested a context-aware stop condition based on experimental outcomes and authors' subjective beliefs. In [17] the authors further improved the previous work by proposing an AISGA method leveraging a GA to optimize the selection of input parameters of the AIS method by minimizing the global risk and the execution time of the method.…”
Section: Methodological Approachesmentioning
confidence: 99%
“…Fig.7depicts the impact of Constraint(17) on the joint objective, QoS, and security of the two ASM and CSM algorithms. This figure is the average result of 500 simulation experiments, where we relax A = 10, C = 4, ξ = 6, and β i = 0.33.There are mainly two points that can be observed from the figures.…”
mentioning
confidence: 99%
“…The rising frequency and severity of cyberattacks underscore the essential role of cybersecurity in protecting organizational assets. Research such as the study by [15] introduces a groundbreaking multi-objective optimization approach for cybersecurity countermeasures using Genetic Algorithms. This methodology aims to fine-tune Artificial Immune System parameters to achieve an ideal balance between minimizing risk and optimizing execution time.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, learning in DQL is governed by a loss function according to Equation (15), which measures the discrepancy between the estimated Q and target values.…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…The rising frequency and severity of cyberattacks underscore the essential role of cybersecurity in protecting organizational assets. Research such as the study by [ 15 ] introduces a groundbreaking multi-objective optimization approach for cybersecurity countermeasures using Genetic Algorithms. Their methodology aims to fine-tune Artificial Immune System parameters to achieve an ideal balance between minimizing risk and optimizing execution time.…”
Section: Related Workmentioning
confidence: 99%