Analysis of a Pairwise Dominance Coevolutionary Algorithm And DefendIt

Per Kristian Lehre*, Mario Hevia Fajardo, Jamal Toutouh, Erik Hemberg*, Una-May O'Reilly

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

While competitive coevolutionary algorithms are ideally suited to model adversarial dynamics, their complexity makes it difficult to understand what is happening when they execute. To achieve better clarity, we introduce a game named DefendIt and explore a previously developed pairwise dominance coevolutionary algorithm named PDCoEA. We devise a methodology for consistent algorithm comparison, then use it to empirically study the impact of population size, the impact of relative budget limits between the defender and attacker, and the impact of mutation rates on the dynamics and payoffs. Our methodology provides reliable comparisons and records of run and multi-run dynamics. Our supplementary material also offers enticing and detailed animations of a pair of players’ game moves over the course of a game of millions of moves matched to the same run’s populations’ payoffs.
Original languageEnglish
Title of host publicationGECCO '23
Subtitle of host publicationProceedings of the Genetic and Evolutionary Computation Conference
PublisherAssociation for Computing Machinery (ACM)
Pages1027-1035
Number of pages9
ISBN (Electronic)9798400701191
DOIs
Publication statusPublished - 12 Jul 2023
EventGECCO '23: Genetic and Evolutionary Computation Conference - Lisbon, Portugal
Duration: 15 Jul 202319 Jul 2023
https://dl.acm.org/conference/gecco

Publication series

NameGECCO: Genetic and Evolutionary Computation Conference

Conference

ConferenceGECCO '23: Genetic and Evolutionary Computation Conference
Abbreviated titleGECCO '23
Country/TerritoryPortugal
CityLisbon
Period15/07/2319/07/23
Internet address

Bibliographical note

Acknowledgments:
Lehre and Hevia Fajardo were supported by a Turing AI Fellowship (EPSRC grant ref EP/V025562/1). The computations were performed using the University of Birmingham’s BlueBEAR HPC service. See http://www.birmingham.ac.uk/bear for more details. Toutouh was supported by the University of Malaga.

Keywords

  • evolutionary algorithms
  • cyber security
  • co-evolution

Fingerprint

Dive into the research topics of 'Analysis of a Pairwise Dominance Coevolutionary Algorithm And DefendIt'. Together they form a unique fingerprint.

Cite this