Abstract
Bio-inspired computing is an active field of research since nature has found solutions for many real-world problems where research so far struggled to develop effective implementations. A new area of research is cyber immunity. Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today’s cyber security systems provide an effective defense mechanism against cyber-attacks. However, traditional firewall and intrusion detection systems often struggle to detect and repel so far unknown attacks. A cyber immune system can mitigate this shortcoming by detecting new, unknown cyber-attacks and by providing a powerful defense mechanism. This paper describes the recent advances in cyber immune systems and their underlying, bio-inspired technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Eronen, P.: Russian hybrid warfare (2016). http://www.defenddemocracy.org/content/uploads/documents/Russian_Hybrid_Warfare.pdf
Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)
Dua, S.: Data Mining and Machine Learning in Cybersecurity. CRC Press, Boca Raton (2011)
Parham, P.: The Immune System. Garland Science, New York (2014)
Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22(1), 187–204 (1986)
Bitam, S., Zeadally, S., Mellouk, A.: Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun. Mag. 54(6), 68–74 (2016)
Dasgupta, D.: Advances in artificial immune systems. IEEE Comput. Intell. Mag. 1(4), 40–49 (2006)
Hill, D.W., Lynn, J.T.: Adaptive system and method for responding to computer network security attacks (2000)
Witten, I.H., Frank, E., Hall, M.A.: Data Mining, 3rd edn. Elsevier, Burlington (2011)
Wlodarczak, P., Soar, J., Ally, M.: Multimedia data mining using deep learning, pp. 190–196 (2015)
Buczak, M.A., Guven, G.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)
Darktrace: The enterprise immune system (2016). https://www.darktrace.com/
Runkler, T.A.: Data Analytics. Springer, Wiesbaden (2012)
IBM launches Watson for Cyber security beta program. IBM (2016). http://www-03.ibm.com/press/us/en/pressrelease/51189.wss. Accessed 19 Dec 2016
Karkouch, A., et al.: Data quality in internet of things: a state-of-the-art survey. J. Netw. Comput. Appl. 73, 57–81 (2016)
Pintea, C.-M.: Bio-inspired computing. In: Pintea, C.-M. (ed.) Advances in Bio-inspired Computing for Combinatorial Optimization Problems, pp. 3–19. Springer, Heidelberg (2014)
Okamoto, T., Tarao, M.: Toward an artificial immune server against cyber attacks. Artif. Life Robot. 21(3), 351–356 (2016)
Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders, pp. 747–755. IEEE Xplore Digital Library (2015)
Graves, A., Wayne, G., Danihelka, I.: Neural Turing Machines. Google DeepMind, London (2014)
Khalid, H.M., Peng, J.C.H.: A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks. IEEE Trans. Smart Grid 7(4), 2026–2037 (2016)
Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: AI^2: training a big data machine to defend, pp. 49–54 (2016)
Kose, U.: An artificial intelligence perspective on ensuring cyber-assurance for the internet of things. In: Cyber-Assurance for the Internet of Things, p. 249 (2016)
Gupta, A., Bhati, B.S., Jain, V.: Artificial intrusion detection techniques: a survey. Int. J. Comput. Netw. Inf. Secur. 6(9), 51 (2014)
Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: FUZZBUSTER: towards adaptive immunity from cyber threats. In: Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 137–140 (2016)
Musliner, D.J., Friedman, S.E., Marble, T., Rye, J.M., Boldt, M.W., Pelican, M.: Self-adaptation metrics for active cybersecurity. In: IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops, pp. 53–58 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wlodarczak, P. (2017). Cyber Immunity. In: Rojas, I., Ortuño, F. (eds) Bioinformatics and Biomedical Engineering. IWBBIO 2017. Lecture Notes in Computer Science(), vol 10209. Springer, Cham. https://doi.org/10.1007/978-3-319-56154-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-56154-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56153-0
Online ISBN: 978-3-319-56154-7
eBook Packages: Computer ScienceComputer Science (R0)