5 research outputs found

    Evolution of Network Enumeration Strategies in Emulated Computer Networks

    Get PDF
    Successful attacks on computer networks today do not often owe their victory to directly overcoming strong security measures set up by the defender. Rather, most attacks succeed because the number of possible vulnerabilities are too large for humans to fully protect without making a mistake. Regardless of the security elsewhere, a skilled attacker can exploit a single vulnerability in a defensive system and negate the benefits of those security measures. This paper presents an evolutionary framework for evolving attacker agents in a real, emulated network environment using genetic programming, as a foundation for coevolutionary systems which can automatically discover and mitigate network security flaws. We examine network enumeration, an initial network reconnaissance step, through our framework and present results demonstrating its success, indicating a broader applicability to further cyber-security tasks

    Unmanned Aerial Vehicle-Based Structure from Motion Technique for Precise Snow Depth Retrieval—Implication for Optimal Ground Control Point Deployment Strategy

    Get PDF
    Unmanned aerial vehicle (UAV)-based snow depth is mapped as the difference between snow-on and snow-off digital surface models (DSMs), which are derived using the structure from motion (SfM) technique with ground control points (GCPs). In this study, we evaluated the impacts of the quality and deployment of GCPs on the accuracy of snow depth estimates. For 15 GCPs in our study area, we surveyed each of their coordinates using an ordinary global positioning system (GPS) and a differential GPS, producing two sets of GCP measurements (hereinafter, the low-accuracy and high-accuracy sets). The two sets of GCP measurements were then incorporated into SfM processing of UAV images by following two deployment strategies to create snow-off and snow-on DSMs and then to retrieve snow depth. In Strategy A, the same GCP measurements in each set were used to create both the snow-on and snow-off DSMs. In Strategy B, each set of GCP measurements was divided into two sub-groups, one sub-group for creating snow-on DSMs and the other sub-group for snow-off DSMs. The accuracy of snow depth estimates was evaluated in comparison to concurrent in-situ snow depth measurements. The results showed that Strategy A, using both the low-accuracy and high-accuracy sets, generated accurate snow depth estimates, while in Strategy B, only the high-accuracy set could generate reliable snow depth estimates. The results demonstrated that the deployment of GCPs had a significant influence on UAV-based SfM snow depth retrieval. When accurate GCP measurements cannot be guaranteed (e.g., in mountainous regions), Strategy A is the optimal option for producing reliable snow depth estimates. When highly accurate GCP measurements are available (e.g., collected by differential GPS in open space), both deployment strategies can produce accurate snow depth estimates
    corecore