Skip to main content

Emerging Cyber Security: Bio-inspired Techniques and MITM Detection in IoT

  • Chapter
  • First Online:
Combatting Cybercrime and Cyberterrorism

Abstract

The major goal of this chapter is to overview and present selected emerging technologies for cybersecurity. In the first part we show the practical realisations of the bio-inspired concepts for cybersecurity. We do not focus on discussing the bio-inspired techniques on a high and abstract level, but we focus on our own practical developments. We want to present concrete solutions with the magazine-like language understandable to all readers. Our goal is to prove that the bio-inspired techniques can be really implemented to protect networks and that the readiness level of such technology is constantly increasing. In this chapter, we present and focus on our own results and give references to our past and on-going cyber security projects where we successfully implemented different nature-inspired solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    DFRC AG is a high-tech Swiss SME, with its core business focused on analysing, understanding and finding new information in location database.

References

  1. Mazurczyk, W., Rzeszutko, E.: Security - a perpetual war: lessons from nature. IEEE IT Prof. 17(1), 16–22 (2015)

    Article  Google Scholar 

  2. Bankovic, Z., et al.: Improving network security using genetic algorithm approach. Comput. Electr. Eng. 33(5–6), 438–451 (2007)

    Article  Google Scholar 

  3. Bin Ahmad, M., et al.: Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment. Math. Prob. Eng. 2014, 12 (2014). Article ID 179109

    Article  Google Scholar 

  4. Choraś, M., et al.: Correlation approach for SQL injection attacks detection. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 177–185. Springer, Heidelberg (2013)

    Google Scholar 

  5. Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid se1quence of two proteins. J. Mol. Biol. 48, 443–453 (1970)

    Article  Google Scholar 

  6. Kozik, R., Choraś, M.: Adapting an ensemble of one-class classifiers for web-layer anonaly detection systems. In: Proceedings of 3GPCIC, Cracow, IEEE Press, pp. 724–729 (2015)

    Google Scholar 

  7. Fink, G.A., Haack, J.N., McKinnon, D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)

    Article  Google Scholar 

  8. Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding focus in the blur of moving-target techniques. IEEE Secur. Priv. 12(2), 16–26 (2014)

    Article  Google Scholar 

  9. Lucas, B., et al.: An initial framework for evolving computer configurations as a moving target defense. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISRC) (2014)

    Google Scholar 

  10. Kewley, D., et al.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX 2001), vol. 1, pp. 176–185 (2001)

    Google Scholar 

  11. Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrović, S., Franke, K.: Application of the generic feature selection measure in detection of web attacks. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 25–32. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Wozniak, M. (ed.): Hybrid Classifier. SCI, vol. 519. Springer, Heidelberg (2014)

    Google Scholar 

  13. McKinnon, A.D., et al.: Bio-inspired cyber security for smart grid deployments. In: 2013 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1–6, 24–27 February 2013

    Google Scholar 

  14. Chhikara, P., Patel, A.K.: Enhancing network security using ant colony optimization. Global J. Comput. Sci. Technol. Netw. Web Secur. 13(4), 19–22 (2013)

    Google Scholar 

  15. Choraś, M., et al.: Information exchange mechanism between federated domains: P2P approach. In: Herrero, Á., et al. (eds.) Int. Joint Conf. CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 187–196. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Dabrowski, A., et al.: IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In: Annual Computer Security Applications Conference (ACSAC) (2014)

    Google Scholar 

Download references

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the CAMINO project under grant agreement no 607406.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Choraś .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Choraś, M., Kozik, R., Maciejewska, I. (2016). Emerging Cyber Security: Bio-inspired Techniques and MITM Detection in IoT. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38930-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38929-5

  • Online ISBN: 978-3-319-38930-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics