Show simple item record

dc.contributor.advisorUna-May O'Reilly and Erik Hemberg.en_US
dc.contributor.authorZhang, Linda(Linda E.)en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2019-11-22T00:00:36Z
dc.date.available2019-11-22T00:00:36Z
dc.date.copyright2019en_US
dc.date.issued2019en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/122992
dc.descriptionThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.en_US
dc.descriptionThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019en_US
dc.descriptionCataloged from student-submitted PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 55-57).en_US
dc.description.abstractDistributed Denial of Service (DDoS) cyberattacks continue to increase and cause disruptions in both industry and politics. As more critical information and services are provided through networks, it becomes more important to keep these networks available. However, since cyber-adversaries continuously change and adapt, stationary defense strategies do not effectively secure networks against attacks. We modeled attacker-defender interactions using competitive coevolutionary algorithms and investigated Nash equilibria within these cybersecurity problems. In particular, we examined and presented variations on two existing algorithms that look for Nash equilibria: NashSolve and HybridCoev. To compare these algorithms' performances against other existing heuristics, we considered multiple evaluation methods: the first calculates average fitness scores, the second creates a compendium of MEU, MinMax, and inverse Pareto front ratio scores, and the third utilizes Nash averaging. Although NashSolve and HybridCoev do not perform significantly better on average for either attacker or defender populations relative to other heuristics in these evaluations, they are able to produce strong individual strategies.en_US
dc.description.statementofresponsibilityby Linda Zhang.en_US
dc.format.extent57 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleInvestigating coevolutionary algorithms for finding Nash equilibria in cybersecurity problemsen_US
dc.typeThesisen_US
dc.description.degreeM. Eng.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.oclc1127291730en_US
dc.description.collectionM.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienceen_US
dspace.imported2019-11-22T00:00:35Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentEECSen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record