Skip to main content
Top

2019 | OriginalPaper | Chapter

Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense

Authors : Usman Rauf, Mujahid Mohsin, Wojciech Mazurczyk

Published in: Bio-inspired Information and Communication Technologies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

After decades of deploying cyber-security systems, it has become a well-known fact that the existing cyber-security architecture has numerous inherent limitations that make the maintenance of the current network security devices unscalable and provide the adversary with asymmetric advantages. These limitations include: (1) difficulty in obtaining the global network picture due to lack of mutual interactions among heterogeneous network devices, (2) poor device self-awareness in current architectures, (3) error-prone and time consuming manual configuration which is not effective in real-time attack mitigation, (4) inability to diagnose misconfiguration and conflict resolution due to multi-party management of security infrastructure. In this paper, as an initial step to deal with these issues, we present a novel bio-inspired auto-resilient security architecture. The main contribution of this paper includes: (1) investigation of laws governing the dynamics of correct feedback control in Biological Regulatory Networks (BRNs), (2) studying their applicability for synthesizing correct models for bio-inspired communication networks, i.e. Firewall Regulatory Networks (FRNs), (3) verification of the formal models of real network scenarios, to prove the correctness of the proposed approach through model checking techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference International Standards Organization ISO/IEC 27005: 2008. Information technology-security techniques-information security risk management. International Standards Organization, Geneva, Switzerland (2008) International Standards Organization ISO/IEC 27005: 2008. Information technology-security techniques-information security risk management. International Standards Organization, Geneva, Switzerland (2008)
2.
go back to reference Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS. CoRR, abs/0803.1997 (2008) Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS. CoRR, abs/0803.1997 (2008)
3.
go back to reference Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press Inc., New York (1999)MATH Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press Inc., New York (1999)MATH
4.
go back to reference de Castro, L.N.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)MATH de Castro, L.N.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)MATH
5.
go back to reference De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: GECCO - Workshop Proceedings, pp. 36–37. Morgan Kaufman (2002) De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: GECCO - Workshop Proceedings, pp. 36–37. Morgan Kaufman (2002)
6.
go back to reference Davidson, E.H., Erwin, D.H.: Gene regulatory networks and the evolution of animal body plans. Science 311(5762), 796–800 (2006)CrossRef Davidson, E.H., Erwin, D.H.: Gene regulatory networks and the evolution of animal body plans. Science 311(5762), 796–800 (2006)CrossRef
8.
go back to reference Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc., San Francisco (2003)MATH Dechter, R.: Constraint Processing. Morgan Kaufmann Publishers Inc., San Francisco (2003)MATH
9.
10.
go back to reference Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 260–268, October 2013 Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 260–268, October 2013
11.
go back to reference Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22, 187–204 (1986). Proceedings of the Fifth Annual International ConferenceMathSciNetCrossRef Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D 22, 187–204 (1986). Proceedings of the Fifth Annual International ConferenceMathSciNetCrossRef
12.
go back to reference Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)CrossRef Fink, G.A., Haack, J.N., McKinnon, A.D., Fulp, E.W.: Defense on the move: ant-based cyber defense. IEEE Secur. Priv. 12(2), 36–43 (2014)CrossRef
13.
go back to reference Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212, May 1994 Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212, May 1994
14.
go back to reference Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 918–926, April 2011 Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Templeton, S.J., Fulp, E.W.: Ant-based cyber security. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 918–926, April 2011
15.
go back to reference Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003) Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Boston (2003)
16.
go back to reference Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, pp. 127–132. ACM (2012) Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, pp. 127–132. ACM (2012)
17.
go back to reference Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261–266 (2009)CrossRef Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261–266 (2009)CrossRef
18.
go back to reference Li, G.Y., Guo, T.: Receptor editing-inspired negative selection algorithm. In: 2010 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, pp. 3117–3122, July 2010 Li, G.Y., Guo, T.: Receptor editing-inspired negative selection algorithm. In: 2010 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 6, pp. 3117–3122, July 2010
19.
go back to reference Liu, Z., Kwiatkowska, M., Constantinou, C.: A swarm intelligence routing algorithm for manets. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT 2004), p. 1. ACTA Press (2004) Liu, Z., Kwiatkowska, M., Constantinou, C.: A swarm intelligence routing algorithm for manets. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT 2004), p. 1. ACTA Press (2004)
20.
go back to reference Modi, P.J., Shen, W.M., Tambe, M., Yokoo, M.: Adopt: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161(1), 149–180 (2005)MathSciNetCrossRef Modi, P.J., Shen, W.M., Tambe, M., Yokoo, M.: Adopt: asynchronous distributed constraint optimization with quality guarantees. Artif. Intell. 161(1), 149–180 (2005)MathSciNetCrossRef
21.
go back to reference Muraleedharan, R., Osadciw, L.A.: An intrusion detection framework for sensor networks using honeypot and swarm intelligence. In: 6th Annual International Mobile and Ubiquitous Systems: Networking Services, MobiQuitous 2009, pp. 1–2, July 2009 Muraleedharan, R., Osadciw, L.A.: An intrusion detection framework for sensor networks using honeypot and swarm intelligence. In: 6th Annual International Mobile and Ubiquitous Systems: Networking Services, MobiQuitous 2009, pp. 1–2, July 2009
22.
go back to reference Rauf, U.: A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions. Arab. J. Sci. Eng. 43, 6693–6708 (2018)CrossRef Rauf, U.: A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions. Arab. J. Sci. Eng. 43, 6693–6708 (2018)CrossRef
23.
go back to reference Rauf, U., Gillani, F., Al-Shaer, E., Halappanavar, M., Chatterjee, S., Oehmen, C.: Formal approach for resilient reachability based on end-system route agility. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD), pp. 117–127 (2016) Rauf, U., Gillani, F., Al-Shaer, E., Halappanavar, M., Chatterjee, S., Oehmen, C.: Formal approach for resilient reachability based on end-system route agility. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD), pp. 117–127 (2016)
24.
go back to reference Rauf, U., Sameen, S., Cerone, A.: Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach. Electron. Notes Theoret. Comput. Sci. 299, 85–100 (2013)MathSciNetCrossRef Rauf, U., Sameen, S., Cerone, A.: Formal analysis of oscillatory behaviors in biological regulatory networks: an alternative approach. Electron. Notes Theoret. Comput. Sci. 299, 85–100 (2013)MathSciNetCrossRef
25.
go back to reference Rauf, U., Siddique, U., Ahmad, J., Niazi, U.: Formal modeling and analysis of biological regulatory networks using spin. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 304–308, November 2011 Rauf, U., Siddique, U., Ahmad, J., Niazi, U.: Formal modeling and analysis of biological regulatory networks using spin. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 304–308, November 2011
26.
go back to reference Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)MATH Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)MATH
27.
go back to reference Sellami, K., Chelouah, R., Sellami, L., Ahmed Nacer, M.: Intrusion detection based on swarm intelligence using mobile agent. In: International Conference on Swarm Intelligence, June 2011 Sellami, K., Chelouah, R., Sellami, L., Ahmed Nacer, M.: Intrusion detection based on swarm intelligence using mobile agent. In: International Conference on Swarm Intelligence, June 2011
28.
go back to reference NIST SP800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, USA (2002) NIST SP800-30. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology, USA (2002)
29.
go back to reference Thomas, L.C., d’Ari, R.: Biological Feedback. CRC Press, Boca Raton (1990)MATH Thomas, L.C., d’Ari, R.: Biological Feedback. CRC Press, Boca Raton (1990)MATH
30.
go back to reference Zeng, J., Liu, X., Li, T., Li, G., Li, H., Zeng, J.: A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1), 41–62 (2011)CrossRef Zeng, J., Liu, X., Li, T., Li, G., Li, H., Zeng, J.: A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Appl. Intell. 35(1), 41–62 (2011)CrossRef
Metadata
Title
Cyber Regulatory Networks: Towards a Bio-inspired Auto-resilient Framework for Cyber-Defense
Authors
Usman Rauf
Mujahid Mohsin
Wojciech Mazurczyk
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-24202-2_12

Premium Partner