Skip to main content

Cyber Immunity

A Bio-Inspired Cyber Defense System

  • Conference paper
  • First Online:
Book cover Bioinformatics and Biomedical Engineering (IWBBIO 2017)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 10209))

Included in the following conference series:

Abstract

Bio-inspired computing is an active field of research since nature has found solutions for many real-world problems where research so far struggled to develop effective implementations. A new area of research is cyber immunity. Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today’s cyber security systems provide an effective defense mechanism against cyber-attacks. However, traditional firewall and intrusion detection systems often struggle to detect and repel so far unknown attacks. A cyber immune system can mitigate this shortcoming by detecting new, unknown cyber-attacks and by providing a powerful defense mechanism. This paper describes the recent advances in cyber immune systems and their underlying, bio-inspired technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Eronen, P.: Russian hybrid warfare (2016). http://www.defenddemocracy.org/content/uploads/documents/Russian_Hybrid_Warfare.pdf

  2. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Article  Google Scholar 

  3. Dua, S.: Data Mining and Machine Learning in Cybersecurity. CRC Press, Boca Raton (2011)

    Book  MATH  Google Scholar 

  4. Parham, P.: The Immune System. Garland Science, New York (2014)

    MATH  Google Scholar 

  5. Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22(1), 187–204 (1986)

    Article  MathSciNet  Google Scholar 

  6. Bitam, S., Zeadally, S., Mellouk, A.: Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun. Mag. 54(6), 68–74 (2016)

    Article  Google Scholar 

  7. Dasgupta, D.: Advances in artificial immune systems. IEEE Comput. Intell. Mag. 1(4), 40–49 (2006)

    Article  Google Scholar 

  8. Hill, D.W., Lynn, J.T.: Adaptive system and method for responding to computer network security attacks (2000)

    Google Scholar 

  9. Witten, I.H., Frank, E., Hall, M.A.: Data Mining, 3rd edn. Elsevier, Burlington (2011)

    Google Scholar 

  10. Wlodarczak, P., Soar, J., Ally, M.: Multimedia data mining using deep learning, pp. 190–196 (2015)

    Google Scholar 

  11. Buczak, M.A., Guven, G.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)

    Article  Google Scholar 

  12. Darktrace: The enterprise immune system (2016). https://www.darktrace.com/

  13. Runkler, T.A.: Data Analytics. Springer, Wiesbaden (2012)

    Book  MATH  Google Scholar 

  14. IBM launches Watson for Cyber security beta program. IBM (2016). http://www-03.ibm.com/press/us/en/pressrelease/51189.wss. Accessed 19 Dec 2016

  15. Karkouch, A., et al.: Data quality in internet of things: a state-of-the-art survey. J. Netw. Comput. Appl. 73, 57–81 (2016)

    Article  Google Scholar 

  16. Pintea, C.-M.: Bio-inspired computing. In: Pintea, C.-M. (ed.) Advances in Bio-inspired Computing for Combinatorial Optimization Problems, pp. 3–19. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  17. Okamoto, T., Tarao, M.: Toward an artificial immune server against cyber attacks. Artif. Life Robot. 21(3), 351–356 (2016)

    Article  Google Scholar 

  18. Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders, pp. 747–755. IEEE Xplore Digital Library (2015)

    Google Scholar 

  19. Graves, A., Wayne, G., Danihelka, I.: Neural Turing Machines. Google DeepMind, London (2014)

    Google Scholar 

  20. Khalid, H.M., Peng, J.C.H.: A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks. IEEE Trans. Smart Grid 7(4), 2026–2037 (2016)

    Article  Google Scholar 

  21. Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: AI^2: training a big data machine to defend, pp. 49–54 (2016)

    Google Scholar 

  22. Kose, U.: An artificial intelligence perspective on ensuring cyber-assurance for the internet of things. In: Cyber-Assurance for the Internet of Things, p. 249 (2016)

    Google Scholar 

  23. Gupta, A., Bhati, B.S., Jain, V.: Artificial intrusion detection techniques: a survey. Int. J. Comput. Netw. Inf. Secur. 6(9), 51 (2014)

    Google Scholar 

  24. Musliner, D.J., Rye, J.M., Thomsen, D., McDonald, D.D., Burstein, M.H., Robertson, P.: FUZZBUSTER: towards adaptive immunity from cyber threats. In: Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops, pp. 137–140 (2016)

    Google Scholar 

  25. Musliner, D.J., Friedman, S.E., Marble, T., Rye, J.M., Boldt, M.W., Pelican, M.: Self-adaptation metrics for active cybersecurity. In: IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops, pp. 53–58 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Wlodarczak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wlodarczak, P. (2017). Cyber Immunity. In: Rojas, I., Ortuño, F. (eds) Bioinformatics and Biomedical Engineering. IWBBIO 2017. Lecture Notes in Computer Science(), vol 10209. Springer, Cham. https://doi.org/10.1007/978-3-319-56154-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56154-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56153-0

  • Online ISBN: 978-3-319-56154-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics