A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Evolution of network enumeration strategies in emulated computer networks
2018
Proceedings of the Genetic and Evolutionary Computation Conference Companion on - GECCO '18
Successful attacks on computer networks today do not often owe their victory to directly overcoming strong security measures set up by the defender. Rather, most attacks succeed because the number of possible vulnerabilities are too large for humans to fully protect without making a mistake. Regardless of the security elsewhere, a skilled attacker can exploit a single vulnerability in a defensive system and negate the benefits of those security measures. This paper presents an evolutionary
doi:10.1145/3205651.3208270
dblp:conf/gecco/HarrisMSGRHTRP18
fatcat:ywkpy6efhbdvtixnpntccfnete