{"title":"Using genetic algorithm to improve the performance of multi-host vulnerability checkers","authors":"A. Mohamed","doi":"10.1109/EURCON.2001.938145","DOIUrl":null,"url":null,"abstract":"This work is based on the reconfiguration of the NetKuang to improve its performance. It operates on computer networks employing the UNIX OS. It detects vulnerabilities in poor system configurations. So this work is not only capable of searching a large number of hosts in parallel, but it also considers potential configuration vulnerabilities present in the network. The main disadvantage of NetKuang is that it can only develop one vulnerability at a time on a given system. Furthermore, there is a leak in memory when running a task. Our work aims at developing more than one vulnerability at a time. Vulnerabilities are discovered using a backward goal-based technique. That is, inducing a different search technique based on a genetic algorithm to discover the vulnerabilities. We aim at using genetic algorithms to point out several vulnerabilities simultaneously. Moreover, our technique overcomes most of the previously mentioned disadvantages produced by the standard technique. Considering the genetic algorithm, there are two different ways that the search would apply: the simple genetic algorithms, and the classifier genetic algorithms. The one chosen in this paper is the classifier genetic algorithm, that would produce the best result. The time and space complexities are computed in order to compare the proposed technique with the standard one for the purpose of getting the best results.","PeriodicalId":205662,"journal":{"name":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EURCON.2001.938145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This work is based on the reconfiguration of the NetKuang to improve its performance. It operates on computer networks employing the UNIX OS. It detects vulnerabilities in poor system configurations. So this work is not only capable of searching a large number of hosts in parallel, but it also considers potential configuration vulnerabilities present in the network. The main disadvantage of NetKuang is that it can only develop one vulnerability at a time on a given system. Furthermore, there is a leak in memory when running a task. Our work aims at developing more than one vulnerability at a time. Vulnerabilities are discovered using a backward goal-based technique. That is, inducing a different search technique based on a genetic algorithm to discover the vulnerabilities. We aim at using genetic algorithms to point out several vulnerabilities simultaneously. Moreover, our technique overcomes most of the previously mentioned disadvantages produced by the standard technique. Considering the genetic algorithm, there are two different ways that the search would apply: the simple genetic algorithms, and the classifier genetic algorithms. The one chosen in this paper is the classifier genetic algorithm, that would produce the best result. The time and space complexities are computed in order to compare the proposed technique with the standard one for the purpose of getting the best results.