Show simple item record

dc.contributor.authorDjeffal, Sofiane.en_US
dc.contributor.otherMassachusetts Institute of Technology. Engineering and Management Program.en_US
dc.contributor.otherSystem Design and Management Program.en_US
dc.date.accessioned2021-10-08T16:48:20Z
dc.date.available2021-10-08T16:48:20Z
dc.date.copyright2020en_US
dc.date.issued2020en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/132812
dc.descriptionThesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, May, 2020en_US
dc.descriptionCataloged from the official version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 89-91).en_US
dc.description.abstractWhile moving to the cloud increases flexibility for many organisations around the world, it also presents its own set of operational risks and complexities when it comes to keeping data and workflows secure. As data becomes digitized, it is becoming more fruitful for bad actors to try to engage in data theft or disrupt online services for their financial gain, corporate espionage, or general intent to disrupt a service. Computers are also becoming more powerful and sophisticated than ever, allowing them to brute force what were once considered top of the line cryptographic ciphers and algorithms in no time. The cost of protecting an infrastructure is increasing both financially and in terms of human resources needed to support a system's security. Companies are relying on the cloud to provide that protection, and one of the ways the cloud provides it is through Edge nodes that sit in front of their infrastruture. Edge nodes are the first line of defense against threats to a web application. This thesis explores a new heuristic for approaching threat generation and detection in a network. It aims to demonstrate that with a proper grammar definition along with a strategy, and a reward system, a genetic algorithm can perform better than the existing rulebased system used to generate and defend against a wide breadth of attacks. This proposes solution focuses on three types of attacks: Data Exfiltration, Server Hijack, and Denial of Service. The goal is to demonstrate that computationally searching for vulnerabilities does not scale well with a rule based system while a genetic algorithm can handle an increase of breadth in attacks with more elegance and better results.en_US
dc.description.statementofresponsibilityby Sofiane Djeffal.en_US
dc.format.extent91 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectEngineering and Management Program.en_US
dc.subjectSystem Design and Management Program.en_US
dc.titleAdaptive defense against adverserial artificial intelligence at the edge of the cloud using evolutionary algorithmsen_US
dc.typeThesisen_US
dc.description.degreeS.M. in Engineering and Managementen_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering and Management Programen_US
dc.identifier.oclc1262990576en_US
dc.description.collectionS.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Programen_US
dspace.imported2021-10-08T16:48:20Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentSysDesen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record