Abstract
The major goal of this chapter is to overview and present selected emerging technologies for cybersecurity. In the first part we show the practical realisations of the bio-inspired concepts for cybersecurity. We do not focus on discussing the bio-inspired techniques on a high and abstract level, but we focus on our own practical developments. We want to present concrete solutions with the magazine-like language understandable to all readers. Our goal is to prove that the bio-inspired techniques can be really implemented to protect networks and that the readiness level of such technology is constantly increasing. In this chapter, we present and focus on our own results and give references to our past and on-going cyber security projects where we successfully implemented different nature-inspired solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
DFRC AG is a high-tech Swiss SME, with its core business focused on analysing, understanding and finding new information in location database.
References
Mazurczyk, W., Rzeszutko, E.: Security - a perpetual war: lessons from nature. IEEE IT Prof. 17(1), 16–22 (2015)
Bankovic, Z., et al.: Improving network security using genetic algorithm approach. Comput. Electr. Eng. 33(5–6), 438–451 (2007)
Bin Ahmad, M., et al.: Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment. Math. Prob. Eng. 2014, 12 (2014). Article ID 179109
Choraś, M., et al.: Correlation approach for SQL injection attacks detection. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 177–185. Springer, Heidelberg (2013)
Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid se1quence of two proteins. J. Mol. Biol. 48, 443–453 (1970)
Kozik, R., Choraś, M.: Adapting an ensemble of one-class classifiers for web-layer anonaly detection systems. In: Proceedings of 3GPCIC, Cracow, IEEE Press, pp. 724–729 (2015)
Fink, G.A., Haack, J.N., McKinnon, D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)
Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding focus in the blur of moving-target techniques. IEEE Secur. Priv. 12(2), 16–26 (2014)
Lucas, B., et al.: An initial framework for evolving computer configurations as a moving target defense. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISRC) (2014)
Kewley, D., et al.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX 2001), vol. 1, pp. 176–185 (2001)
Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrović, S., Franke, K.: Application of the generic feature selection measure in detection of web attacks. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 25–32. Springer, Heidelberg (2011)
Wozniak, M. (ed.): Hybrid Classifier. SCI, vol. 519. Springer, Heidelberg (2014)
McKinnon, A.D., et al.: Bio-inspired cyber security for smart grid deployments. In: 2013 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1–6, 24–27 February 2013
Chhikara, P., Patel, A.K.: Enhancing network security using ant colony optimization. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(4), 19–22 (2013)
Choraś, M., et al.: Information exchange mechanism between federated domains: P2P approach. In: Herrero, Á., et al. (eds.) Int. Joint Conf. CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 187–196. Springer, Heidelberg (2013)
Dabrowski, A., et al.: IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In: Annual Computer Security Applications Conference (ACSAC) (2014)
Acknowledgement
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the CAMINO project under grant agreement no 607406.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Choraś, M., Kozik, R., Maciejewska, I. (2016). Emerging Cyber Security: Bio-inspired Techniques and MITM Detection in IoT. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)