831 research outputs found

    Parameterized Complexity Analysis of Randomized Search Heuristics

    Full text link
    This chapter compiles a number of results that apply the theory of parameterized algorithmics to the running-time analysis of randomized search heuristics such as evolutionary algorithms. The parameterized approach articulates the running time of algorithms solving combinatorial problems in finer detail than traditional approaches from classical complexity theory. We outline the main results and proof techniques for a collection of randomized search heuristics tasked to solve NP-hard combinatorial optimization problems such as finding a minimum vertex cover in a graph, finding a maximum leaf spanning tree in a graph, and the traveling salesperson problem.Comment: This is a preliminary version of a chapter in the book "Theory of Evolutionary Computation: Recent Developments in Discrete Optimization", edited by Benjamin Doerr and Frank Neumann, published by Springe

    Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

    Full text link
    Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize their chance of successfully reaching the destination before getting detected. The defender's task is to block a constant number of edges to decrease the attacker's chance of success. We show that the problem is #P-hard and, therefore, intractable to solve exactly. We convert the attacker's problem to an exponential sized Dynamic Program that is approximated by a Neural Network (NN). Once trained, the NN provides an efficient fitness function for the defender's Evolutionary Diversity Optimisation (EDO). The diversity emphasis on the defender's solution provides a diverse set of training samples, which improves the training accuracy of our NN for modelling the attacker. We go back and forth between NN training and EDO. Experimental results show that for R500 graph, our proposed EDO based defense is less than 1% away from the optimal defense

    Algorithms to prevent attacks in active directory environments

    Get PDF
    Microsoft Active Directory is the default management system for Windows domain networks, so convenient that it is used in many organizations worldwide. Because of this popularity, AD has been a focused cyberattack target. An Active Directory environment could be described as an attack graph in which nodes represent users, computers, groups, and services. The problem is formulated with an attacker who has managed to infiltrate the network to a certain number of nodes (entry nodes) and seeks to reach the most privileged node. On the other hand, the defender's objective will be to maximize the attacker's shortest path length. In this paper, we have conducted a study of the AD-blocking style graph. We have observed that the attack graphs of this Microsoft service have small maximum attack path lengths and are tree-like. The problem is computationally difficult. Six different algorithms have been formulated to solve the problem. Firstly, the problem of blocking only the most vital edge of the attack graph has been investigated, where two algorithms have been formulated and will later become greedy algorithms. An FPT algorithm and three heuristic algorithms have also been developed: a Hill Climbing, a Simulated Annealing, and a genetic algorithm. With these algorithms, we will help IT admins identify high-risk edges in practical Active Directory environments

    Artificial immune systems can find arbitrarily good approximations for the NP-hard number partitioning problem

    Get PDF
    Typical artificial immune system (AIS) operators such as hypermutations with mutation potential and ageing allow to efficiently overcome local optima from which evolutionary algorithms (EAs) struggle to escape. Such behaviour has been shown for artificial example functions constructed especially to show difficulties that EAs may encounter during the optimisation process. However, no evidence is available indicating that these two operators have similar behaviour also in more realistic problems. In this paper we perform an analysis for the standard NP-hard Partition problem from combinatorial optimisation and rigorously show that hypermutations and ageing allow AISs to efficiently escape from local optima where standard EAs require exponential time. As a result we prove that while EAs and random local search (RLS) may get trapped on 4/3 approximations, AISs find arbitrarily good approximate solutions of ratio (1+) within n(−(2/)−1)(1 − )−2e322/ + 2n322/ + 2n3 function evaluations in expectation. This expectation is polynomial in the problem size and exponential only in 1/

    Planning And Scheduling For Large-scaledistributed Systems

    Get PDF
    Many applications require computing resources well beyond those available on any single system. Simulations of atomic and subatomic systems with application to material science, computations related to study of natural sciences, and computer-aided design are examples of applications that can benefit from the resource-rich environment provided by a large collection of autonomous systems interconnected by high-speed networks. To transform such a collection of systems into a user\u27s virtual machine, we have to develop new algorithms for coordination, planning, scheduling, resource discovery, and other functions that can be automated. Then we can develop societal services based upon these algorithms, which hide the complexity of the computing system for users. In this dissertation, we address the problem of planning and scheduling for large-scale distributed systems. We discuss a model of the system, analyze the need for planning, scheduling, and plan switching to cope with a dynamically changing environment, present algorithms for the three functions, report the simulation results to study the performance of the algorithms, and introduce an architecture for an intelligent large-scale distributed system
    • …
    corecore