<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Symposium on Adversary-Aware Learn-
ing Techniques and Trends in Cybersecurity, Arlington, VA,
USA</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>An Artificial Coevolutionary Framework for Adversarial AI</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Una-May O'Reilly</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Erik Hemberg</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Massachusetts Institute of Technology</institution>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Strategy adaptation of Attack &amp; Defense</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <volume>1</volume>
      <fpage>8</fpage>
      <lpage>19</lpage>
      <abstract>
        <p>Cyber adversaries are engaged in a perpetual arms race. They are continuously maneuvering to outwit the opposing posture. Replicating and studying the dynamics of these engagements provides a route to proactive, adversarially-hardened cyber defenses. The constant struggle can be computationally formulated as a competitive coevolutionary system which generates many arms races that can be harvested for robust solutions. We present a paradigm, techniques and tools that recreate the coevolutionary process in the context of network cyber security scenarios. We describe its current use cases and how we harvest defensive solutions from it.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The greatest concern a prepared cyber defender might
raise is: “What if my assumptions are wrong?” It is
common knowledge that the only certainty is that an
intelligent adversary will always keep trying to gain an
advantage. Moreover, once forced to react, a defender
is too late. So, how can a defender use Artificial
Intelligence (AI) to gain an edge in an environment that is
stacked to the attacker’s advantage, where the defender
seems doomed to always be one step behind?</p>
      <p>One approach, adversarial AI, is to deploy defensive
configurations, that consider multiple possible
anticipated adversarial behaviors and already take into
account their expected impact, goal, strategies or tactics.
Note that the precise metrics in this accounting can
vary. For example, impact can be any combination of
financial cost, disruption level or outcome risk. Or, a
defender could prioritize a worst case, average case or
a trade-off configuration.</p>
      <p>
        One way that such defensive configurations can be
found is by using stochastic search methods that first
explore the simulated competitive behavior of
adversaries and then generate ranked configurations
according to a variety of different objectives so a decision
maker can choose among them. In particular, the field
of coevolutionary algorithms
        <xref ref-type="bibr" rid="ref20">(Popovici et al. 2012)</xref>
        provides search heuristics that specifically direct
competitive engagements. The engagements are between
members of adversarial populations with opposing objectives
that each undergo selection on the basis of performance
and variation to adapt. Coevolutionary logic results in
population-wide adversarial dynamics. Such dynamics
can expose possible adversarial behaviors that a defense
would like to anticipate. A competitive coevolutionary
algorithm can be a component of a larger system, see
for example Figure 1, in which a complementary
component sets up the environment where pairs of adversaries
engage and measures the outcome for each adversary.
These measures can be used by the coevolutionary
algorithm to judge an adversary’s fitness.
      </p>
      <p>Herein we summarize a framework that we
have used to generate robust defensive
configurations (Prado Sanchez 2018; Pertierra 2018). It is
composed of different coevolutionary algorithms to help it
generate diverse behavior. The algorithms, for further
diversity, use different “solution concepts”, i.e.
measures of adversarial success. Because engagements are
frequently computationally expensive and have to be
pairwise sampled from two populations each generation,
the framework has a number of enhancements that
enable efficient use of a fixed budget of computation or
time.</p>
      <p>
        The framework supports a number of use-cases using
simulation and emulation of varying model
granularity. These include: A) Defending a peer-2-peer
network against Distributed Denial of Service (DDOS)
attacks
        <xref ref-type="bibr" rid="ref7">(Garcia et al. 2017)</xref>
        B) Defenses against
spreading device compromise in a segmented enterprise
network
        <xref ref-type="bibr" rid="ref9">(Hemberg et al. 2018)</xref>
        , and C) Deceptive
defense against the internal reconnaissance of an
adversary within a software defined network (Pertierra 2018)
      </p>
      <p>The framework is linked up to a decision
support module named ESTABLO (Sanchez et al. 2018;
Prado Sanchez 2018). The engagements of every run
of any of the coevolutionary algorithms are cached and,
later, ESTABLO gathers adversaries resulting from
different algorithms for its compendium. It then competes
the adversaries of each side against those of the other
side and ranks each side’s members according to
multiple criteria. It also provides visualizations and
comparisons of adversarial behaviors. This information informs
the decision process of a defensive manager.</p>
      <p>The adversarial AI framework’s specific contributions
are:</p>
      <p>The use of coevolutionary algorithms to adaptively
generate adversarial dynamics supporting preemptively
investigating adversarial arms races that could occur.</p>
      <p>A suite of different coevolutionary algorithms that
diversify the behavior of the adversaries to broaden the
potential dynamics.</p>
      <p>Use cases that model a variety of adversarial threat
and defensive models.</p>
      <p>A decision support module that supports selection
of a superior anticipatory defensive configuration.</p>
      <p>Background provides context on modeling and
simulation and coevolutionary search algorithm.
Framework describes our coevolutionary method,
engagement component and decision support module. Use
Cases provides examples applying to cyber security
and network attacks. Conclusions summarizes and
addresses future work.</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        The strategy of testing the security of a system by
trying to successfully attack it is somewhat analogous
to software fuzzing
        <xref ref-type="bibr" rid="ref17">(Miller, Fredriksen, and So 1990)</xref>
        .
Fuzzing tests software adaptively to search for bugs
while adaptive attacks test defenses. In contrast to
software where a bugs is fixed by humans, our
approach automatically adapts a defense. This forms a
novel counter attack. Fuzzing is driven by genetic
algorithms (GA) whereas, to drive cyber arms races in
which both adversaries adapt, our approach uses
coupled GAs called competitive coevolutionary algorithms.
      </p>
      <sec id="sec-2-1">
        <title>Coevolutionary Search Algorithms</title>
        <p>
          Coevolutionary algorithms, related to evolutionary
algorithms (
          <xref ref-type="bibr" rid="ref4">Bäck 1996</xref>
          ), explore domains in which the
quality of a candidate solution is determined by its
ability to successfully pass some set of tests.
Reciprocally, a test ’s quality is determined by its ability to
force errors from some set of solutions. In
competitive coevolution, similar to game theory, the search can
lead to an arms race between test and solution, both
evolving while pursuing opposite objectives
          <xref ref-type="bibr" rid="ref20">(Popovici
et al. 2012)</xref>
          . An example of learning in a
coevolutionary algorithm is shown in Algorithm 1. A basic
coevolutionary algorithm evolves two populations with e.g.
tournament selection and for variation uses crossover
and mutation. One population comprises attacks and
the other defenses. In each generation, competitions
are formed by pairing attack and defense. The
populations are evolved in alternating steps: first the attacker
population is selected, varied, updated and evaluated
against the defenders, and then the defender population
is selected, varied, updated and evaluated against the
defenders. Each attacker–defender pair is dispatched to
the engagement component to compete and the result is
used as a component of fitness for each of them. Fitness
is calculated over all an adversary’s engagements.
        </p>
        <p>The representation of test s (and solutions) is
customizable in any coevolutionary algorithm (Rothlauf
2011) under the design constraint that it be amenable
to stochastic variation, e.g. “genetic crossover” or
mutation. It may directly express the test or it may do so
indirectly, e.g. with a grammar. In the latter case, an
intermediate interpreter works with a rule-based
grammar to map from a “genome” that undergoes variation
to a “phenome” that expresses an executable behavior.
Grammars (and GA representations, in general) offer
design flexibility: changing out a grammar and the
environment of behavioral execution does not require any
changes to the rest of the algorithm.</p>
        <p>
          Coevolutionary algorithms can encounter
problematic dynamics where tests are unable improve
solutions, or drive toward a solution that is the a priori
intended goal. There are accepted remedies to specific
coevolutionary pathologies
          <xref ref-type="bibr" rid="ref20 ref5 ref6">(Bongard and Lipson 2005;
Ficici 2004; Popovici et al. 2012)</xref>
          . They generally
include maintaining population diversity so that a search
gradient is always present and using more explicit
memory, e.g. a Hall of Fame or an archive, to prevent
regress
          <xref ref-type="bibr" rid="ref16">(Miconi 2009)</xref>
          . The pathologies of
coevolutionary algorithms are similar to those encountered by
generative adversarial networks (GANs) (Goodfellow et al.
2014; Arora et al. 2017)
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Modeling and Simulation</title>
        <p>
          A coevolutionary algorithm includes an environment
that supports executing the tests and solutions to
compete against each other in each engagement. We use
modeling and simulation for this purpose. Mod-sim
systems range in complexity, level of abstraction and
resolution. Modeling and simulation comprise a powerful
approach, “ mod-sim”, for investigating general security
scenarios (Tambe 2012), computer security
          <xref ref-type="bibr" rid="ref12">(Thompson, Morris-King, and Cam 2016; Lange et al. 2017;
Winterrose and Carter 2014)</xref>
          and network dynamics
in particular, e.g., in CANDLES – the Coevolutionary,
Agent-based, Network Defense Lightweight Event
System of (Rush, Tauritz, and Kent 2015), attacker and
defender strategies are coevolved in the context of a
sinAlgorithm 1 Example Coevolutionary Algorithm
Input:
T : number of iterations L: Fitness function
: mutation probability, : population size
gle, custom, abstract computer network defense
simulation.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Framework Components</title>
      <sec id="sec-3-1">
        <title>Coevolutionary Algorithms</title>
        <p>
          The framework supports diverse behavior by executing
algorithms that vary in synchronization of the two
populations and solution concepts. (Prado Sanchez 2018;
Pertierra 2018). Working within a fixed time or fitness
evaluation budget, the framework also
1. Caches engagements to avoid repeating them;
2. Uses Gaussian process estimation to identify and
evaluate the most uncertain engagement (Pertierra
2018);
3. Uses a recommender technique to approximate some
adversary’s fitnesses (Pertierra 2018); and
4. Uses a spatial grid to reduce complete
pairwise engagements to a Moore neighborhood
quantity
          <xref ref-type="bibr" rid="ref18 ref5">(Mitchell 2006; Williams and Mitchell 2005)</xref>
          .
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Engagement Environment</title>
        <p>The engagement component is flexible and can support
a problem-specific network testbed, simulator or model.
The abstraction level of the use case determines the
choice of a simple to more detailed mod-sim or even
Parameters
Search Algorithm
Grammar rewriting</p>
        <p>CFG Parser
Integer inputsequence</p>
        <p>Context Free Grammar</p>
        <p>Output Sentence (Strategy)
Search</p>
        <p>Engagement</p>
        <p>Interpreter</p>
        <p>Fitness Evaluator
CoevolutionaryAlgorithm
Fitness Value
the actual engagement environment. Mod-sim is
appropriate when testbeds incur long experimental cycle
times or do not abstract away irrelevant detail.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Adversary Representation</title>
        <p>
          The framework uses grammars to express open ended
behavioral action sequences for attack and defense
strategies (a.k.a controllers). See Figure 2 and
          <xref ref-type="bibr" rid="ref19">(O’Neill
and Ryan 2003)</xref>
          for more details. While the
framework’s grammars currently are strategic in nature, we
foresee incorporating higher level behavior related to
plans and goals.
        </p>
        <p>A grammar is introduced in Backus Naur Form
(BNF) and describes a language in the problem
domain. The BNF description is parsed to a context
free grammar representation. Its (rewrite) rules express
how a sentence, i.e. test or solution, can be composed
by rewriting a start symbol. The adversaries are fixed
length integer vectors that are use to control the
rewriting. To interpret them, in sequence each of the vector’s
integers is referenced. This resulting sentence is the
strategy that is executed. For solving different
problems, it is only necessary to change the BNF
grammar, engagement environment and fitness function of
the adversaries. This modularity, and reusability of the
parser and rewriter are efficient software engineering
and problem solving advantages. The grammar
additionally helps communicate the framework’s
functionality to stakeholders by enabling conversations and
validation at the domain level. This contributes to
stakeholder confidence in solutions and the framework.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Decision Support</title>
        <p>Competitive coevolution has the following
challenges (Sanchez et al. 2018; Prado Sanchez 2018):
1. Solutions and tests are not on comparable on a “level
playing field” because fitness is based solely on the
context of engagements.
2. Blind spots, unvisited by the algorithms may exist.
3. From multiple runs, with one or more algorithms, it
is unclear how to automatically select a “best”
solution.</p>
        <p>The framework’s decision support module, ESTABLO,
see Figure 3, addresses these challenges. ESTABLO:
A) runs competitive coevolutionary search algorithms
with different solution concepts; B) combines the best
solutions and tests at the end of each run into a
compendium; C) competes each solution against different
test sets, including the compendium and a set of unseen
tests, to measure its performance according to different
solution concepts; D) selects the “best” solutions from
the compendium using a ranking and filtering process;
and E) visualizes the best solutions to support a
transparent and auditable decision.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Use Cases of the Framework</title>
      <p>In this section we demonstrate use cases of the
Adversarial AI framework. Broadly their goal is to
identify defensive configurations that are effective against a
range of potential adversaries.</p>
      <sec id="sec-4-1">
        <title>DOS Attacks on Peer-to-Peer Networks</title>
        <p>
          A peer-to-peer (P2P) network is a robust and resilient
means of securing mission reliability in the face of
extreme distributed denial of service (DDOS) attacks.
The project named RIVALS
          <xref ref-type="bibr" rid="ref7">(Garcia et al. 2017)</xref>
          assists
in developing P2P network defense strategies against
DDOS attacks. It models adversarial DDOS attack and
defense dynamics to help identify robust network
design and deployment configurations that support
mission completion despite an ongoing attack.
        </p>
        <p>RIVALS models DDOS attack strategies using a
variety of behavioral languages ranging from simple to
complex. A simple language e.g. allows a strategy to
select one or more network servers to disable for some
duration. Defenders can choose one of three different
network routing protocols: shortest path, flooding and
a peer-to-peer ring overlay to try to maintain their
performance. A more complex one allows a varying number
of steps over which the attack is modulated in duration,
strength and targets and can even include online
adaptation based on observed impact. Defenders can adapt
based on local or global network conditions. Attack
completion and resource cost minimization serve as
attacker objectives. Mission completion and resource cost
minimization are the reciprocal defender objectives.
RIVALS has a suite of coevolutionary algorithms that use
archiving to maintain progressive exploration and that
support different solution concepts as fitness metrics.</p>
        <p>An example of attackers from ESTABLO on a mobile
resource allocation defense used in RIVALS (Sanchez
et al. 2018) is shown in Figure 4. The mobile asset
placement defense challenge is to optimize the strategic
placement of assets in the network. While under the
threat of node-level DDOS attack, the defense must
enable a set of tasks. It does this by fielding feasible paths
between the nodes that host the assets which support
the tasks. A mobile asset is, for example, mobile
personnel or a software application that can be served by
any number of nodes. A task is, for example, the
connection that allows personnel to use a software
application.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Availability Attacks on Segmented</title>
      </sec>
      <sec id="sec-4-3">
        <title>Networks</title>
        <p>
          Attackers also often introduce malware into networks.
Once an attacker has compromised a device on a
network, they can move to connected devices, akin to
contagion. This use case considers network
segmentation, a widely recommended defensive strategy,
deployed against the threat of serial network security
attacks that delay the mission of the network’s
operator
          <xref ref-type="bibr" rid="ref9">(Hemberg et al. 2018)</xref>
          in the context of malware
spread.
        </p>
        <p>Network segmentation divides the network
topologically into enclaves that serve as isolation units to deter
inter-enclave contagion. How much network
segmentation is helpful is a tradeoff. On the one hand, a more
segmented network provides less mission efficiency
because of increased overhead in inter-enclave
communication. On the other hand, smaller enclaves contain
compromise by limiting the spread rate, and their cleansing
incurs fewer mission delays. Adding complexity, given
some segmentation, a network operator can further use
threat monitoring and network cleansing policies to
detect and dislodge attackers but they come with a
tradeoff of cost versus efficacy.</p>
        <p>The use case assumes a network supports an
enterprise in carrying out its business or mission, and that an
adversary employs availability attacks against the
network to disrupt this mission. Specifically, the attacker
starts by using an exploit to compromise a vulnerable
device on the network. This inflicts a mission delay
when a mission critical device is infected. Then, the
attacker moves laterally to compromise additional
devices and maximally delay the mission. The network
and its segments are pre-determined but the placement
of critical devices within an enclave and the deployment
of defensive threat monitoring device are open to
optimization.</p>
        <p>
          The use case employs a simulation model as its
engagement environment. Malware contagion of a specific
spread rate is assumed. The defender decides placement
of mission devices and tap sensitivities in the enclaves.
The attacker decides the strength, duration and
number of attacks in an attack plan targeting all enclaves.
For a network with a set of four enclave topologies, the
framework is able to generate strong availability attack
patterns that were not identified a priori. It also
identifies effective configurations that minimize mission delay
when facing these attacks.
Once an adversary has compromised a network
endpoint, they can perform network reconnaissance (Sood
and Enbody 2013). After reconnaissance provides a
view of the network and an understanding of where
vulnerable nodes are located, they are able to execute
a plan of attack. One way to protect against
reconnaissance is by obfuscating the network to delay the
attacker. This approach is well suited to software defined
networks (SDN) such as those being used in many cloud
server settings because it requires programmability that
they support
          <xref ref-type="bibr" rid="ref10">(Kirkpatrick 2013)</xref>
          . The SDN controller
knows which machines are actually on the network and
can superficially alter (without function loss) the
network view of each node, as well as place decoys
(honeypots) on the network to mislead, trap and slow down
reconnaissance.
        </p>
        <p>
          One such multi-component deceptive defense system
          <xref ref-type="bibr" rid="ref1">(Achleitner, Laporta, and McDaniel 2016)</xref>
          foils
scanning by generating “camouflaged” versions of the actual
network and providing them to hosts when they renew
their DHCP leases. We use this deception system and
mininet (Team 2018) within the framework as an
engagement environment. This allows us to explore the
dynamics between attacker and defender on a network
where the deception and reconnaissance strategies can
be adapted in response to each other (Pertierra 2018).
A deception strategy is executed through a modified
POX SDN controller. A reconnaissance strategy is
executed by a NMAP scan
          <xref ref-type="bibr" rid="ref14">(Lyon 2018)</xref>
          . The attacker
strategy includes choices of: which IP addresses to scan, how
many IP addresses to scan, which subnets to scan, the
percent of the subnets to scan, the scanning speed, and
the type of scan. The defender strategy includes choices
of: the number of subnets to setup, the number of
honeypots, the distribution of the real hosts throughout
the subnets, and the number of real hosts that exist
on the network. Fitness is comprised of four
components: how fast the defender detects that there is a
scan taking place, the total time it takes to run the
scan, the number of times that the defender detects the
scanner, and the number of real hosts that the
scanner discovers. Through experimentation and analysis,
the framework is able to discover certain configurations
that the defender can use to significantly increase its
ability to detect scans. Similarly, there are specific
reconnaissance configurations that have a better chance
of being undetected.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>We have described an AI framework that recreates, in
an abstract way, the adversarial, competitive
coevolutionary process that occurs in security scenarios. We
presented its current use cases and how we harvest
defensive solutions from it. Future work includes
extending it to support more cyber security applications,
considering other use cases and developing more efficient
or true to reality algorithms.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This material is based upon work supported by
DARPA. The views and conclusions contained herein
are those of the authors and should not be interpreted
as necessarily representing the official policies or
endorsements. Either expressed or implied of Applied
Communication Services, or the US Government.</p>
      <p>Pertierra, M. 2018. Investigating coevolutionary
algorithms for expensive fitness evaluations in
cybersecurity. Master’s thesis, Massachusetts Institute of
Technology.</p>
      <p>Prado Sanchez, D. 2018. Visualizing adversaries -
transparent pooling approaches for decision support in
cybersecurity. Master’s thesis, Massachusetts Institute of
Technology.</p>
      <p>Rothlauf, F. 2011. Design of modern heuristics:
principles and application. Springer Science &amp; Business
Media.</p>
      <p>Rush, G.; Tauritz, D. R.; and Kent, A. D. 2015.
Coevolutionary agent-based network defense lightweight
event system (candles). In Proceedings of the
Companion Publication of the 2015 on Genetic and
Evolutionary Computation Conference, 859–866. ACM.
Sanchez, D. P.; Pertierra, M. A.; Hemberg, E.; and
O’Reilly, U.-M. 2018. Competitive coevolutionary
algorithm decision support. In Proceedings of the Genetic
and Evolutionary Computation Conference Companion,
300–301. ACM.</p>
      <p>Sood, A., and Enbody, R. 2013. Targeted cyberattacks:
a superset of advanced persistent threats. IEEE security
&amp; privacy 11(1):54–61.</p>
      <p>Tambe, M., ed. 2012. Security and Game Theory:
Algorithms, Deployed Systems, Lessons Learned. Cambridge
University Press.</p>
      <p>Team, M. 2018. Mininet - realistic virtual sdn network
emulator. http://mininet.org/. [Online; accessed
6July-2018].</p>
      <p>Thompson, B.; Morris-King, J.; and Cam, H. 2016.
Controlling risk of data exfiltration in cyber networks
due to stealthy propagating malware. In Military
Communications Conference, MILCOM 2016-2016 IEEE,
479–484. IEEE.</p>
      <p>Williams, N., and Mitchell, M. 2005. Investigating
the success of spatial coevolution. In Proceedings of
the 7th annual conference on Genetic and evolutionary
computation, 523–530. ACM.</p>
      <p>Winterrose, M. L., and Carter, K. M. 2014. Strategic
evolution of adversaries against temporal platform
diversity active cyber defenses. In Proceedings of the 2014
Symposium on Agent Directed Simulation, 9. Society
for Computer Simulation International.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Achleitner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Laporta,
          <string-name>
            <given-names>T.</given-names>
            ; and
            <surname>McDaniel</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>Cyber deception: Virtual networks to defend insider reconnaissance</article-title>
          .
          <source>In Proceedings of the 2016 International Workshop on Managing Insider Security Threats</source>
          <volume>57</volume>
          -68.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Arora</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Ge,
          <string-name>
            <surname>R.</surname>
          </string-name>
          ; Liang,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          ; Ma, T.; and Zhang,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>Generalization and Equilibrium in Generative Adversarial Nets (GANs)</article-title>
          .
          <source>arXiv preprint arXiv:1703</source>
          .
          <fpage>00573</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Bäck</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>1996</year>
          .
          <article-title>Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms</article-title>
          . Oxford University Press.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Bongard</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Lipson</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <year>2005</year>
          .
          <article-title>Nonlinear system identification using coevolution of models and tests</article-title>
          .
          <source>IEEE Transactions on Evolutionary Computation</source>
          <volume>9</volume>
          (
          <issue>4</issue>
          ):
          <fpage>361</fpage>
          -
          <lpage>384</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Ficici</surname>
            ,
            <given-names>S. G.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Solution concepts in coevolutionary algorithms</article-title>
          .
          <source>Ph.D. Dissertation</source>
          , Citeseer.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Garcia</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Lugo</surname>
            ,
            <given-names>A. E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hemberg</surname>
            , E.; and
            <given-names>O</given-names>
          </string-name>
          <string-name>
            <surname>'Reilly</surname>
          </string-name>
          , U.-M.
          <year>2017</year>
          .
          <article-title>Investigating coevolutionary archive based genetic algorithms on cyber defense networks</article-title>
          .
          <source>In Proceedings of the Genetic and Evolutionary Computation Conference Companion</source>
          , GECCO '
          <volume>17</volume>
          ,
          <fpage>1455</fpage>
          -
          <lpage>1462</lpage>
          . New York, NY, USA: ACM.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Pouget-Abadie</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Mirza,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ;
            <surname>Warde-Farley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Ozair</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ;
            <surname>Courville</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          ; and Bengio,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <year>2014</year>
          .
          <article-title>Generative adversarial nets</article-title>
          .
          <source>In Advances in Neural Information Processing Systems</source>
          ,
          <volume>2672</volume>
          -
          <fpage>2680</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Hemberg</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Zipkin</surname>
            ,
            <given-names>J. R.</given-names>
          </string-name>
          ; Skowyra,
          <string-name>
            <surname>R. W.</surname>
          </string-name>
          ; Wagner, N.; and
          <string-name>
            <given-names>O</given-names>
            <surname>'Reilly</surname>
          </string-name>
          , U.-M.
          <year>2018</year>
          .
          <article-title>Adversarial co-evolution of attack and defense in a segmented computer network environment</article-title>
          .
          <source>In Proceedings of the Genetic and Evolutionary Computation Conference Companion</source>
          ,
          <fpage>1648</fpage>
          -
          <lpage>1655</lpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Kirkpatrick</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Software-defined networking</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>Communications of the ACM</source>
          <volume>56</volume>
          (
          <issue>9</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Lange</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kott</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ben-Asher</surname>
          </string-name>
          , N.;
          <string-name>
            <surname>Mees</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ; Baykal,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Vidu</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.-M.; Merialdo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Malowidzki</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Madahar</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2017</year>
          .
          <article-title>Recommendations for model-driven paradigms for integrated approaches to cyber defense.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>arXiv preprint arXiv:1703</source>
          .
          <fpage>03306</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Lyon</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <year>2018</year>
          .
          <article-title>Nmap network scanner</article-title>
          . https://nmap.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>org/. [Online; accessed 6-July-2018].</mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Miconi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Why coevolution doesn't "work": superiority and progress in coevolution</article-title>
          .
          <source>In European Conference on Genetic Programming</source>
          ,
          <fpage>49</fpage>
          -
          <lpage>60</lpage>
          . Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B. P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Fredriksen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>So</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>1990</year>
          .
          <article-title>An empirical study of the reliability of unix utilities</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>33</volume>
          (
          <issue>12</issue>
          ):
          <fpage>32</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Mitchell</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2006</year>
          .
          <article-title>Coevolutionary learning with spatially distributed populations</article-title>
          .
          <source>Computational intelligence: principles and practice.</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>O'Neill</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>Grammatical evolution: evolutionary automatic programming in an arbitrary language</article-title>
          , volume
          <volume>4</volume>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Popovici</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bucci</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wiegand</surname>
            ,
            <given-names>R. P.</given-names>
          </string-name>
          ; and De Jong, E. D.
          <year>2012</year>
          .
          <article-title>Coevolutionary principles</article-title>
          .
          <source>In Handbook of natural computing</source>
          . Springer.
          <fpage>987</fpage>
          -
          <lpage>1033</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>