Skip to main content
Top

2016 | OriginalPaper | Chapter

NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies

Authors : Stuart H. Rubin, Thouraya Bouabana-Tebibel

Published in: Recent Advances in Computational Intelligence in Defense and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Software security is increasingly a concern as cyber-attacks become more frequent and sophisticated. This chapter presents an approach to counter this trend and make software more resistant through redundancy and diversity. The approach, termed Novel Naval Cyber Strategies (NNCS), addresses how to immunize component-based software. The software engineer programs defining component rule bases using a schema-based Very High Level Language (VHLL). Chance and ordered transformation are dynamically balanced in the definition of diverse components. The system of systems is shown to be relatively immune to cyber-attacks; and, as a byproduct, yield this capability for effective component generalization. This methodology offers exponential increases in cyber security; whereas, conventional approaches can do no better than linear. A sample battle management application—including rule randomization—is provided.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Uspenskii, V.A.: Gödel’s Incompleteness Theorem, Translated from Russian. Ves Mir Publishers, Moscow (1987) Uspenskii, V.A.: Gödel’s Incompleteness Theorem, Translated from Russian. Ves Mir Publishers, Moscow (1987)
2.
go back to reference Gherbi, A., Charpentier, R., Couture, M.: Software diversity for future systems security. CrossTalk 24, 10–13 (2011) Gherbi, A., Charpentier, R., Couture, M.: Software diversity for future systems security. CrossTalk 24, 10–13 (2011)
3.
go back to reference Kfoury, A.J., Moll, R.N., Arbib, M.A.: A Programming Approach to Computability. Springer, New York (1982)CrossRefMATH Kfoury, A.J., Moll, R.N., Arbib, M.A.: A Programming Approach to Computability. Springer, New York (1982)CrossRefMATH
5.
go back to reference Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In:Workshop on Hot Topics in Operating Systems, pp. 57–72 (1997) Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In:Workshop on Hot Topics in Operating Systems, pp. 57–72 (1997)
6.
go back to reference Ammann, P., Barnes, B.H., Jajodia, S., Sibley E.H. (eds): Computer Security, Dependability, and Assurance: from Needs to Solutions. IEEE Computer Society Press, Williamsburg (1998) Ammann, P., Barnes, B.H., Jajodia, S., Sibley E.H. (eds): Computer Security, Dependability, and Assurance: from Needs to Solutions. IEEE Computer Society Press, Williamsburg (1998)
7.
go back to reference Fung, G.P.C., Yu, J.X., Lu, H.J., Yu, P.S.: Text classification without negative examples revisit. IEEE Trans. Knowl. Data Eng. 18(1), 6–20 (2006)CrossRef Fung, G.P.C., Yu, J.X., Lu, H.J., Yu, P.S.: Text classification without negative examples revisit. IEEE Trans. Knowl. Data Eng. 18(1), 6–20 (2006)CrossRef
8.
go back to reference Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2010)CrossRef Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2010)CrossRef
9.
go back to reference Lu, J., Behbood, V., Hao, P., Zuo, H., Xue, S., Zhang, G.: Transfer learning using computational intelligence: a survey. Knowl. Based Syst. 80, 14–23 (2015)CrossRef Lu, J., Behbood, V., Hao, P., Zuo, H., Xue, S., Zhang, G.: Transfer learning using computational intelligence: a survey. Knowl. Based Syst. 80, 14–23 (2015)CrossRef
10.
go back to reference Huang, J.-T., Li, J., Yu, D., Deng, L., Gong, Y.: Cross-language knowledge transfer using multilingual deep neural network with shared hidden layers. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada (2013) Huang, J.-T., Li, J., Yu, D., Deng, L., Gong, Y.: Cross-language knowledge transfer using multilingual deep neural network with shared hidden layers. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada (2013)
11.
go back to reference Swietojanski, P., Ghoshal, A., Renals, S.: Unsupervised cross-lingual knowledge transfer in DNN-based LVCSR. In: IEEE Workshop on Spoken Language Technology, Miami, USA (2012) Swietojanski, P., Ghoshal, A., Renals, S.: Unsupervised cross-lingual knowledge transfer in DNN-based LVCSR. In: IEEE Workshop on Spoken Language Technology, Miami, USA (2012)
12.
go back to reference Behbood, V., Lu, J., Zhang, G.: Text categorization by fuzzy domain adaptation. In: IEEE International Conference on Fuzzy Systems, Hyderabad, India (2013) Behbood, V., Lu, J., Zhang, G.: Text categorization by fuzzy domain adaptation. In: IEEE International Conference on Fuzzy Systems, Hyderabad, India (2013)
13.
go back to reference Ciresan, D.C., Meier, U., Schmidhuber, J.: Transfer learning for Latin and Chinese characters with deep neural networks. In: International Joint Conference on Neural Networks, Australia (2012) Ciresan, D.C., Meier, U., Schmidhuber, J.: Transfer learning for Latin and Chinese characters with deep neural networks. In: International Joint Conference on Neural Networks, Australia (2012)
14.
go back to reference Kandaswamy, C., Silva, L.M., Alexandre, L.A., Santos, J.M., De Sa, J.M.: Improving deep neural network performance by reusing features trained with transductive transference. In: 24th International Conference on Artificial Neural Networks, Hamburg, Germany (2014) Kandaswamy, C., Silva, L.M., Alexandre, L.A., Santos, J.M., De Sa, J.M.: Improving deep neural network performance by reusing features trained with transductive transference. In: 24th International Conference on Artificial Neural Networks, Hamburg, Germany (2014)
15.
go back to reference Shell, J., Coupland, S.: Towards fuzzy transfer learning for intelligent environments. Ambient Intell. 7683, 145–160 (2012) Shell, J., Coupland, S.: Towards fuzzy transfer learning for intelligent environments. Ambient Intell. 7683, 145–160 (2012)
16.
go back to reference Celiberto Jr., L.A., Matsuura, J.P., De Mantaras, R.L., Bianchi, R.A.C.: Using cases as heuristics in reinforcement learning: a transfer learning application. In: International Joint Conference on Artificial Intelligence, Barcelona, Spain (2011) Celiberto Jr., L.A., Matsuura, J.P., De Mantaras, R.L., Bianchi, R.A.C.: Using cases as heuristics in reinforcement learning: a transfer learning application. In: International Joint Conference on Artificial Intelligence, Barcelona, Spain (2011)
17.
go back to reference Niculescu-Mizil, A., Caruana, R.: Inductive transfer for Bayesian network structure learning. In: 11th International Conference on Artificial Intelligence and Statistics, Puerto Rico (2007) Niculescu-Mizil, A., Caruana, R.: Inductive transfer for Bayesian network structure learning. In: 11th International Conference on Artificial Intelligence and Statistics, Puerto Rico (2007)
18.
go back to reference Oyen, D., Lane, T.: Bayesian discovery of multiple Bayesian networks via transfer learning. In: 13th IEEE International Conference on Data Mining (ICDM), Dalla, USA (2013) Oyen, D., Lane, T.: Bayesian discovery of multiple Bayesian networks via transfer learning. In: 13th IEEE International Conference on Data Mining (ICDM), Dalla, USA (2013)
19.
go back to reference Behbood, V., Lu, J., Zhang, G.: Long term bank failure prediction using fuzzy refinement-based transductive transfer learning. In: IEEE International Conference on Fuzzy Systems, Taiwan (2011) Behbood, V., Lu, J., Zhang, G.: Long term bank failure prediction using fuzzy refinement-based transductive transfer learning. In: IEEE International Conference on Fuzzy Systems, Taiwan (2011)
20.
go back to reference Behbood, V., Lu, J., Zhang, G.: Fuzzy bridged refinement domain adaptation: long-term bank failure prediction, Int. J. Comput. Intell. Appl. 12(01) (2013) Behbood, V., Lu, J., Zhang, G.: Fuzzy bridged refinement domain adaptation: long-term bank failure prediction, Int. J. Comput. Intell. Appl. 12(01) (2013)
21.
go back to reference Behbood, V., Lu, J., Zhang, G.: Fuzzy refinement domain adaptation for long term prediction in banking ecosystem. IEEE Trans. Ind. Inform. 10(2), 1637–1646 (2014)CrossRef Behbood, V., Lu, J., Zhang, G.: Fuzzy refinement domain adaptation for long term prediction in banking ecosystem. IEEE Trans. Ind. Inform. 10(2), 1637–1646 (2014)CrossRef
22.
go back to reference Ma, Y., Luo, G., Zeng, X., Chen, A.: Transfer learning for cross-company software defect prediction. Inf. Softw. Technol. 54(3), 248–256 (2012)CrossRef Ma, Y., Luo, G., Zeng, X., Chen, A.: Transfer learning for cross-company software defect prediction. Inf. Softw. Technol. 54(3), 248–256 (2012)CrossRef
23.
go back to reference Luis, R., Sucar, L.E., Morales, E.F.: Inductive transfer for learning Bayesian networks. Mach. Learn. 79(1–2), 227–255 (2010)MathSciNetCrossRef Luis, R., Sucar, L.E., Morales, E.F.: Inductive transfer for learning Bayesian networks. Mach. Learn. 79(1–2), 227–255 (2010)MathSciNetCrossRef
24.
go back to reference Shell, J.: Fuzzy transfer learning. Ph.D. thesis, De Montfort University (2013) Shell, J.: Fuzzy transfer learning. Ph.D. thesis, De Montfort University (2013)
25.
go back to reference Chopra, S., Balakrishnan, S., Gopalan, R.: DLID: deep learning for domain adaptation by interpolating between domains. In: ICML Workshop on Challenges in Representation Learning, Atlanta, USA (2013) Chopra, S., Balakrishnan, S., Gopalan, R.: DLID: deep learning for domain adaptation by interpolating between domains. In: ICML Workshop on Challenges in Representation Learning, Atlanta, USA (2013)
26.
go back to reference Caruana, R.: Multitask learning: a knowledge-based source of inductive bias. In: Tenth International Conference of Machine Learning, MA, USA (1993) Caruana, R.: Multitask learning: a knowledge-based source of inductive bias. In: Tenth International Conference of Machine Learning, MA, USA (1993)
27.
28.
go back to reference Silver, D.L., Poirier, R.: Context-sensitive MTL networks for machine lifelong learning. In: 20th Florida Artificial Intelligence Research Society Conference, Key West, USA (2007) Silver, D.L., Poirier, R.: Context-sensitive MTL networks for machine lifelong learning. In: 20th Florida Artificial Intelligence Research Society Conference, Key West, USA (2007)
29.
go back to reference Dai, W., Xue, G., Yang, Q., Yu, Y.: Transferring naive Bayes classifiers for text classification. In: 22nd National Conference on Artificial Intelligence, Vancouver, Canada (2007) Dai, W., Xue, G., Yang, Q., Yu, Y.: Transferring naive Bayes classifiers for text classification. In: 22nd National Conference on Artificial Intelligence, Vancouver, Canada (2007)
30.
go back to reference Roy, D.M., Kaelbling, L.P.: Efficient Bayesian task-level transfer learning. In: International Joint Conference on Artificial Intelligence, Hyderabad, India (2007) Roy, D.M., Kaelbling, L.P.: Efficient Bayesian task-level transfer learning. In: International Joint Conference on Artificial Intelligence, Hyderabad, India (2007)
31.
go back to reference Shell, J., Coupland, S.: Fuzzy transfer learning: methodology and application. Inf. Sci. 293, 59–79 (2015)CrossRef Shell, J., Coupland, S.: Fuzzy transfer learning: methodology and application. Inf. Sci. 293, 59–79 (2015)CrossRef
32.
go back to reference Koçer, B., Arslan, A.: Genetic transfer learning. Expert Syst. Appl. 37(10), 6997–7002 (2010)CrossRef Koçer, B., Arslan, A.: Genetic transfer learning. Expert Syst. Appl. 37(10), 6997–7002 (2010)CrossRef
33.
go back to reference Chaitin, G.J.: Randomness and mathematical proof. Sci. Amer. 232(5), 47–52 (1975)CrossRef Chaitin, G.J.: Randomness and mathematical proof. Sci. Amer. 232(5), 47–52 (1975)CrossRef
35.
go back to reference Solomonoff, R.: A new method for discovering the grammars of phrase structure languages. In: International Conference Information Processing, pp. 285–290. UNESCO, Paris, France (1959) Solomonoff, R.: A new method for discovering the grammars of phrase structure languages. In: International Conference Information Processing, pp. 285–290. UNESCO, Paris, France (1959)
36.
go back to reference Solomonoff, R.: A Formal Theory of Inductive Inference. Inf. Control 7, 71–22 and 224–254 (1964) Solomonoff, R.: A Formal Theory of Inductive Inference. Inf. Control 7, 71–22 and 224–254 (1964)
37.
go back to reference Honavar, V., Slutzki, G. (eds.): Grammatical Inference. Lecture Notes in Artificial Intelligence, vol. 1433. Springer, Berlin (1998) Honavar, V., Slutzki, G. (eds.): Grammatical Inference. Lecture Notes in Artificial Intelligence, vol. 1433. Springer, Berlin (1998)
38.
go back to reference Fu, K.S.: Syntactic Pattern Recognition and Applications. Prentice-Hall Advances in Computing Science and Technology Series. Prentice Hall, Englewood Cliffs (1982) Fu, K.S.: Syntactic Pattern Recognition and Applications. Prentice-Hall Advances in Computing Science and Technology Series. Prentice Hall, Englewood Cliffs (1982)
39.
go back to reference Rubin, S.H.: Computing with words. IEEE Trans. Syst. Man Cybern. Part B 29(4), 518–524 (1999) Rubin, S.H.: Computing with words. IEEE Trans. Syst. Man Cybern. Part B 29(4), 518–524 (1999)
40.
go back to reference Liang, Q., Rubin, S.H.: Randomization for testing systems of systems. In: Proceedings of the 10th IEEE International Conference Information Reuse and Integration, pp. 110–114. Las Vegas, NV, 10–12 Aug 2009 Liang, Q., Rubin, S.H.: Randomization for testing systems of systems. In: Proceedings of the 10th IEEE International Conference Information Reuse and Integration, pp. 110–114. Las Vegas, NV, 10–12 Aug 2009
41.
go back to reference Bouabana-Tebibel, T., Rubin, S.H. (eds.): Integration of Reusable Systems. Springer, Switzerland (2014) Bouabana-Tebibel, T., Rubin, S.H. (eds.): Integration of Reusable Systems. Springer, Switzerland (2014)
42.
go back to reference Kolmogorov, A.N., Uspenskii, V.A.: On the definition of an algorithm. Amer. Math. Soc. Transl. 29(2), 217–245 (1963) (in Russian, English translation) Kolmogorov, A.N., Uspenskii, V.A.: On the definition of an algorithm. Amer. Math. Soc. Transl. 29(2), 217–245 (1963) (in Russian, English translation)
43.
go back to reference Deitel, H.M.: An Introduction to Operating Systems. Prentice Hall, Inc., Upper Saddle River (1984)MATH Deitel, H.M.: An Introduction to Operating Systems. Prentice Hall, Inc., Upper Saddle River (1984)MATH
44.
go back to reference Nilsson, N.J.: Principles of Artificial Intelligence. Tioga Publishing Company, Palo Alto (1980)MATH Nilsson, N.J.: Principles of Artificial Intelligence. Tioga Publishing Company, Palo Alto (1980)MATH
45.
go back to reference Bilinski, M.: Compiler Techniques as a Defense Against Cyber Attacks. Machine Learning Series. SSC-PAC, San Diego (2014) Bilinski, M.: Compiler Techniques as a Defense Against Cyber Attacks. Machine Learning Series. SSC-PAC, San Diego (2014)
46.
go back to reference Rubin, S.H.: Case-Based Generalization (CBG) for Increasing the Applicability and Ease of Access to Case-Based Knowledge for Predicting COAs. NC No. 101366 (2011) Rubin, S.H.: Case-Based Generalization (CBG) for Increasing the Applicability and Ease of Access to Case-Based Knowledge for Predicting COAs. NC No. 101366 (2011)
47.
go back to reference Rubin, S.H., Lee, G., Chen, S.C.: A case-based reasoning decision support system for fleet maintenance. Naval Engineers J., NEJ-2009-05-STP-0239.R1, 1–10 (2009) Rubin, S.H., Lee, G., Chen, S.C.: A case-based reasoning decision support system for fleet maintenance. Naval Engineers J., NEJ-2009-05-STP-0239.R1, 1–10 (2009)
48.
go back to reference Rubin, S.H.: multi-level segmented case-based learning systems for multi-sensor fusion. NC No. 101451 (2011) Rubin, S.H.: multi-level segmented case-based learning systems for multi-sensor fusion. NC No. 101451 (2011)
49.
go back to reference Rubin, S.H.: Multilevel constraint-based randomization adapting case-based learning to fuse sensor data for autonomous predictive analysis. NC 101614 (2012) Rubin, S.H.: Multilevel constraint-based randomization adapting case-based learning to fuse sensor data for autonomous predictive analysis. NC 101614 (2012)
50.
go back to reference Minton, S.: Learning Search Control Knowledge: An Explanation Based Approach, vol. 61. Kluwer, New York (1988) Minton, S.: Learning Search Control Knowledge: An Explanation Based Approach, vol. 61. Kluwer, New York (1988)
51.
go back to reference Feigenbaum, E.A., McCorduck, P.: The Fifth Generation. Addison-Wesley Publishing Company, Reading (1983) Feigenbaum, E.A., McCorduck, P.: The Fifth Generation. Addison-Wesley Publishing Company, Reading (1983)
52.
go back to reference Rubin, S.H.: Is the Kolmogorov complexity of computational intelligence bounded above? In: 12th IEEE International Conference Information Reuse and Integration, pp. 455–461. Las Vegas (2011) Rubin, S.H.: Is the Kolmogorov complexity of computational intelligence bounded above? In: 12th IEEE International Conference Information Reuse and Integration, pp. 455–461. Las Vegas (2011)
Metadata
Title
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies
Authors
Stuart H. Rubin
Thouraya Bouabana-Tebibel
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-26450-9_8

Premium Partner