Automated testing for cyber threats to ad-hoc wireless networks

Incremental Adaptive Corrective Learning is a method for testing ad-hoc wireless networks for vulnerabilities that adversaries can exploit. It is based on an evolutionary search for tests that define behaviors for adversary-controlled network nodes. The search incrementally increases the number of such nodes and first adapts each new node to the behaviors of the already existing attackers before improving the behavior of all attackers. Tests are evaluated in simulations and behaviors are corrected to fulfill all protocol induced obligations that are not explicitly targeted for an exploit. In this paper, we substantiate the claim that this is a general method by instantiating it for different vulnerability goals and by presenting an application for cooperative collision avoidance using VANETs. In all those instantiations, the method is able to produce concrete tests that demonstrate vulnerabilities.

[1]  Jörg Denzinger,et al.  Testing of precision agricultural networks for adversary-induced problems , 2013, GECCO '13.

[2]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[3]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[4]  Joan García-Haro,et al.  Testing viability of relay policies for reactive CCA applications in VANETs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[5]  Jeffrey E. Boyd,et al.  Automated Testing of Physical Security: Red Teaming Through Machine Learning , 2015, Comput. Intell..

[6]  Jörg Denzinger,et al.  Behavior Learning-Based Testing of Starcraft Competition Entries , 2011, AIIDE.

[7]  Subir Biswas,et al.  Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety , 2006, IEEE Communications Magazine.

[8]  Klaus Wehrle,et al.  KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment , 2010, IPSN '10.

[9]  Matthias Woehrle,et al.  Search-Based Stress Testing of Wireless Network Protocol Stacks , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[10]  John A. Clark,et al.  Protocols are programs too: the meta-heuristic search for security protocols , 2001, Inf. Softw. Technol..

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[13]  Jörg Denzinger,et al.  Testing the Limits of Emergent Behavior in MAS Using Learning of Cooperative Behavior , 2006, ECAI.

[14]  Thomas Bäck,et al.  Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .

[15]  Joan Garcia-Haro,et al.  Performance Evaluation of a CCA Application for VANETs Using IEEE 802.11p , 2010, 2010 IEEE International Conference on Communications Workshops.