Skip to main content

2019 | OriginalPaper | Buchkapitel

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense

verfasst von : Usman Rauf, Mujahid Mohsin, Wojciech Mazurczyk

Erschienen in: Bio-inspired Information and Communication Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

After decades of deploying cyber-security systems, it has become a well-known fact that the existing cyber-security architecture has numerous inherent limitations that make the maintenance of the current network security devices unscalable and provide the adversary with asymmetric advantages. These limitations include: (1) difficulty in obtaining the global network picture due to lack of mutual interactions among heterogeneous network devices, (2) poor device self-awareness in current architectures, (3) error-prone and time consuming manual configuration which is not effective in real-time attack mitigation, (4) inability to diagnose misconfiguration and conflict resolution due to multi-party management of security infrastructure. In this paper, as an initial step to deal with these issues, we present a novel bio-inspired auto-resilient security architecture. The main contribution of this paper includes: (1) investigation of laws governing the dynamics of correct feedback control in Biological Regulatory Networks (BRNs), (2) studying their applicability for synthesizing correct models for bio-inspired communication networks, i.e. Firewall Regulatory Networks (FRNs), (3) verification of the formal models of real network scenarios, to prove the correctness of the proposed approach through model checking techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat International Standards Organization ISO/IEC 27005: 2008. Information technology-security techniques-information security risk management. International Standards Organization, Geneva, Switzerland (2008) International Standards Organization ISO/IEC 27005: 2008. Information technology-security techniques-information security risk management. International Standards Organization, Geneva, Switzerland (2008)
2.
Zurück zum Zitat Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS. CoRR, abs/0803.1997 (2008) Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS. CoRR, abs/0803.1997 (2008)
3.
Zurück zum Zitat Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press Inc., New York (1999)MATH Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press Inc., New York (1999)MATH
4.
Zurück zum Zitat de Castro, L.N.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)MATH de Castro, L.N.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)MATH
5.
Zurück zum Zitat De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: GECCO - Workshop Proceedings, pp. 36–37. Morgan Kaufman (2002) De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: GECCO - Workshop Proceedings, pp. 36–37. Morgan Kaufman (2002)
6.
Zurück zum Zitat Davidson, E.H., Erwin, D.H.: Gene regulatory networks and the evolution of animal body plans. Science 311(5762), 796–800 (2006)CrossRef Davidson, E.H., Erwin, D.H.: Gene regulatory networks and the evolution of animal body plans. Science 311(5762), 796–800 (2006)CrossRef
8.
Zurück zum Zitat Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc., San Francisco (2003)MATH Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc., San Francisco (2003)MATH
9.
Zurück zum Zitat Dressler, F.: Self-organized network security facilities based on bio-inspired promoters and inhibitors. In: Dressler, F., Carreras, I. (eds.) Advances in Biologically Inspired Information Systems. Studies in Computational Intelligence, pp. 81–98. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72693-7_5CrossRef Dressler, F.: Self-organized network security facilities based on bio-inspired promoters and inhibitors. In: Dressler, F., Carreras, I. (eds.) Advances in Biologically Inspired Information Systems. Studies in Computational Intelligence, pp. 81–98. Springer, Heidelberg (2007). https://​doi.​org/​10.​1007/​978-3-540-72693-7_​5CrossRef
10.
Zurück zum Zitat Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 260–268, October 2013 Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 260–268, October 2013
11.
Zurück zum Zitat Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22, 187–204 (1986). Proceedings of the Fifth Annual International ConferenceMathSciNetCrossRef Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22, 187–204 (1986). Proceedings of the Fifth Annual International ConferenceMathSciNetCrossRef
12.
Zurück zum Zitat Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)CrossRef Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)CrossRef
13.
Zurück zum Zitat Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212, May 1994 Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212, May 1994
14.
Zurück zum Zitat Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 918–926, April 2011 Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 918–926, April 2011
15.
Zurück zum Zitat Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003) Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003)
16.
Zurück zum Zitat Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, pp. 127–132. ACM (2012) Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, pp. 127–132. ACM (2012)
17.
Zurück zum Zitat Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261–266 (2009)CrossRef Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261–266 (2009)CrossRef
18.
Zurück zum Zitat Li, G.Y., Guo, T.: Receptor editing-inspired negative selection algorithm. In: 2010 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, pp. 3117–3122, July 2010 Li, G.Y., Guo, T.: Receptor editing-inspired negative selection algorithm. In: 2010 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, pp. 3117–3122, July 2010
19.
Zurück zum Zitat Liu, Z., Kwiatkowska, M., Constantinou, C.: A swarm intelligence routing algorithm for manets. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT 2004), p. 1. ACTA Press (2004) Liu, Z., Kwiatkowska, M., Constantinou, C.: A swarm intelligence routing algorithm for manets. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT 2004), p. 1. ACTA Press (2004)
20.
Zurück zum Zitat Modi, P.J., Shen, W.M., Tambe, M., Yokoo, M.: Adopt: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161(1), 149–180 (2005)MathSciNetCrossRef Modi, P.J., Shen, W.M., Tambe, M., Yokoo, M.: Adopt: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161(1), 149–180 (2005)MathSciNetCrossRef
21.
Zurück zum Zitat Muraleedharan, R., Osadciw, L.A.: An intrusion detection framework for sensor networks using honeypot and swarm intelligence. In: 6th Annual International Mobile and Ubiquitous Systems: Networking Services, MobiQuitous 2009, pp. 1–2, July 2009 Muraleedharan, R., Osadciw, L.A.: An intrusion detection framework for sensor networks using honeypot and swarm intelligence. In: 6th Annual International Mobile and Ubiquitous Systems: Networking Services, MobiQuitous 2009, pp. 1–2, July 2009
22.
Zurück zum Zitat Rauf, U.: A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions. Arab. J. Sci. Eng. 43, 6693–6708 (2018)CrossRef Rauf, U.: A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions. Arab. J. Sci. Eng. 43, 6693–6708 (2018)CrossRef
23.
Zurück zum Zitat Rauf, U., Gillani, F., Al-Shaer, E., Halappanavar, M., Chatterjee, S., Oehmen, C.: Formal approach for resilient reachability based on end-system route agility. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD), pp. 117–127 (2016) Rauf, U., Gillani, F., Al-Shaer, E., Halappanavar, M., Chatterjee, S., Oehmen, C.: Formal approach for resilient reachability based on end-system route agility. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD), pp. 117–127 (2016)
24.
Zurück zum Zitat Rauf, U., Sameen, S., Cerone, A.: Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach. Electron. Notes Theoret. Comput. Sci. 299, 85–100 (2013)MathSciNetCrossRef Rauf, U., Sameen, S., Cerone, A.: Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach. Electron. Notes Theoret. Comput. Sci. 299, 85–100 (2013)MathSciNetCrossRef
25.
Zurück zum Zitat Rauf, U., Siddique, U., Ahmad, J., Niazi, U.: Formal modeling and analysis of biological regulatory networks using spin. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 304–308, November 2011 Rauf, U., Siddique, U., Ahmad, J., Niazi, U.: Formal modeling and analysis of biological regulatory networks using spin. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 304–308, November 2011
26.
Zurück zum Zitat Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)MATH Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)MATH
27.
Zurück zum Zitat Sellami, K., Chelouah, R., Sellami, L., Ahmed Nacer, M.: Intrusion detection based on swarm intelligence using mobile agent. In: International Conference on Swarm Intelligence, June 2011 Sellami, K., Chelouah, R., Sellami, L., Ahmed Nacer, M.: Intrusion detection based on swarm intelligence using mobile agent. In: International Conference on Swarm Intelligence, June 2011
28.
Zurück zum Zitat NIST SP800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, USA (2002) NIST SP800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, USA (2002)
29.
Zurück zum Zitat Thomas, L.C., d’Ari, R.: Biological Feedback. CRC Press, Boca Raton (1990)MATH Thomas, L.C., d’Ari, R.: Biological Feedback. CRC Press, Boca Raton (1990)MATH
30.
Zurück zum Zitat Zeng, J., Liu, X., Li, T., Li, G., Li, H., Zeng, J.: A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1), 41–62 (2011)CrossRef Zeng, J., Liu, X., Li, T., Li, G., Li, H., Zeng, J.: A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1), 41–62 (2011)CrossRef
Metadaten
Titel
Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense
verfasst von
Usman Rauf
Mujahid Mohsin
Wojciech Mazurczyk
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-24202-2_12

Premium Partner