Skip to main content

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense

  • Conference paper
  • First Online:
Bio-inspired Information and Communication Technologies (BICT 2019)

Abstract

After decades of deploying cyber-security systems, it has become a well-known fact that the existing cyber-security architecture has numerous inherent limitations that make the maintenance of the current network security devices unscalable and provide the adversary with asymmetric advantages. These limitations include: (1) difficulty in obtaining the global network picture due to lack of mutual interactions among heterogeneous network devices, (2) poor device self-awareness in current architectures, (3) error-prone and time consuming manual configuration which is not effective in real-time attack mitigation, (4) inability to diagnose misconfiguration and conflict resolution due to multi-party management of security infrastructure. In this paper, as an initial step to deal with these issues, we present a novel bio-inspired auto-resilient security architecture. The main contribution of this paper includes: (1) investigation of laws governing the dynamics of correct feedback control in Biological Regulatory Networks (BRNs), (2) studying their applicability for synthesizing correct models for bio-inspired communication networks, i.e. Firewall Regulatory Networks (FRNs), (3) verification of the formal models of real network scenarios, to prove the correctness of the proposed approach through model checking techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. International Standards Organization ISO/IEC 27005: 2008. Information technology-security techniques-information security risk management. International Standards Organization, Geneva, Switzerland (2008)

    Google Scholar 

  2. Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS. CoRR, abs/0803.1997 (2008)

    Google Scholar 

  3. Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press Inc., New York (1999)

    MATH  Google Scholar 

  4. de Castro, L.N.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)

    MATH  Google Scholar 

  5. De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: GECCO - Workshop Proceedings, pp. 36–37. Morgan Kaufman (2002)

    Google Scholar 

  6. Davidson, E.H., Erwin, D.H.: Gene regulatory networks and the evolution of animal body plans. Science 311(5762), 796–800 (2006)

    Article  Google Scholar 

  7. de Moura, L., Bjørner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337–340. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78800-3_24

    Chapter  Google Scholar 

  8. Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc., San Francisco (2003)

    MATH  Google Scholar 

  9. Dressler, F.: Self-organized network security facilities based on bio-inspired promoters and inhibitors. In: Dressler, F., Carreras, I. (eds.) Advances in Biologically Inspired Information Systems. Studies in Computational Intelligence, pp. 81–98. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72693-7_5

    Chapter  Google Scholar 

  10. Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 260–268, October 2013

    Google Scholar 

  11. Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22, 187–204 (1986). Proceedings of the Fifth Annual International Conference

    Article  MathSciNet  Google Scholar 

  12. Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)

    Article  Google Scholar 

  13. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212, May 1994

    Google Scholar 

  14. Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 918–926, April 2011

    Google Scholar 

  15. Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003)

    Google Scholar 

  16. Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, pp. 127–132. ACM (2012)

    Google Scholar 

  17. Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261–266 (2009)

    Article  Google Scholar 

  18. Li, G.Y., Guo, T.: Receptor editing-inspired negative selection algorithm. In: 2010 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, pp. 3117–3122, July 2010

    Google Scholar 

  19. Liu, Z., Kwiatkowska, M., Constantinou, C.: A swarm intelligence routing algorithm for manets. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT 2004), p. 1. ACTA Press (2004)

    Google Scholar 

  20. Modi, P.J., Shen, W.M., Tambe, M., Yokoo, M.: Adopt: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161(1), 149–180 (2005)

    Article  MathSciNet  Google Scholar 

  21. Muraleedharan, R., Osadciw, L.A.: An intrusion detection framework for sensor networks using honeypot and swarm intelligence. In: 6th Annual International Mobile and Ubiquitous Systems: Networking Services, MobiQuitous 2009, pp. 1–2, July 2009

    Google Scholar 

  22. Rauf, U.: A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions. Arab. J. Sci. Eng. 43, 6693–6708 (2018)

    Article  Google Scholar 

  23. Rauf, U., Gillani, F., Al-Shaer, E., Halappanavar, M., Chatterjee, S., Oehmen, C.: Formal approach for resilient reachability based on end-system route agility. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD), pp. 117–127 (2016)

    Google Scholar 

  24. Rauf, U., Sameen, S., Cerone, A.: Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach. Electron. Notes Theoret. Comput. Sci. 299, 85–100 (2013)

    Article  MathSciNet  Google Scholar 

  25. Rauf, U., Siddique, U., Ahmad, J., Niazi, U.: Formal modeling and analysis of biological regulatory networks using spin. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 304–308, November 2011

    Google Scholar 

  26. Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)

    MATH  Google Scholar 

  27. Sellami, K., Chelouah, R., Sellami, L., Ahmed Nacer, M.: Intrusion detection based on swarm intelligence using mobile agent. In: International Conference on Swarm Intelligence, June 2011

    Google Scholar 

  28. NIST SP800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, USA (2002)

    Google Scholar 

  29. Thomas, L.C., d’Ari, R.: Biological Feedback. CRC Press, Boca Raton (1990)

    MATH  Google Scholar 

  30. Zeng, J., Liu, X., Li, T., Li, G., Li, H., Zeng, J.: A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1), 41–62 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Usman Rauf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rauf, U., Mohsin, M., Mazurczyk, W. (2019). Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense. In: Compagnoni, A., Casey, W., Cai, Y., Mishra, B. (eds) Bio-inspired Information and Communication Technologies. BICT 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-24202-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24202-2_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24201-5

  • Online ISBN: 978-3-030-24202-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics