By Topic

Using genetic algorithm to improve the performance of multi-host vulnerability checkers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Mohamed, A.B. ; Coll. of Eng. & Technol., Arab Acad. for Sci. & Technol., Alexandria, Egypt

This work is based on the reconfiguration of the NetKuang to improve its performance. It operates on computer networks employing the UNIX OS. It detects vulnerabilities in poor system configurations. So this work is not only capable of searching a large number of hosts in parallel, but it also considers potential configuration vulnerabilities present in the network. The main disadvantage of NetKuang is that it can only develop one vulnerability at a time on a given system. Furthermore, there is a leak in memory when running a task. Our work aims at developing more than one vulnerability at a time. Vulnerabilities are discovered using a backward goal-based technique. That is, inducing a different search technique based on a genetic algorithm to discover the vulnerabilities. We aim at using genetic algorithms to point out several vulnerabilities simultaneously. Moreover, our technique overcomes most of the previously mentioned disadvantages produced by the standard technique. Considering the genetic algorithm, there are two different ways that the search would apply: the simple genetic algorithms, and the classifier genetic algorithms. The one chosen in this paper is the classifier genetic algorithm, that would produce the best result. The time and space complexities are computed in order to compare the proposed technique with the standard one for the purpose of getting the best results.

Published in:

EUROCON'2001, Trends in Communications, International Conference on.  (Volume:2 )

Date of Conference:

4-7 July 2001