Nature-inspired cyber security and resiliency : fundamentals, techniques and applications
This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
Saved in:
| Other Authors | , , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Stevenage :
Institution of Engineering & Technology,
2019.
|
| Series | IET security series ;
10. |
| Subjects | |
| Online Access | Full text |
| ISBN | 1785616390 9781785616396 9781523124374 1523124377 9781785616389 1785616382 |
| Physical Description | 1 online resource (xx, 454 pages) |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | kn-on1099985733 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 190504t20192019enk ob 001 0 eng d | ||
| 040 | |a EBLCP |b eng |e pn |c EBLCP |d STF |d OCLCO |d UKAHL |d CDN |d OCLCF |d UIU |d N$T |d YDX |d KNOVL |d VRC |d CUS |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
| 020 | |a 1785616390 | ||
| 020 | |a 9781785616396 |q (electronic bk.) | ||
| 020 | |a 9781523124374 |q (electronic bk.) | ||
| 020 | |a 1523124377 |q (electronic bk.) | ||
| 020 | |z 9781785616389 |q (hbk.) | ||
| 020 | |z 1785616382 |q (hbk.) | ||
| 035 | |a (OCoLC)1099985733 |z (OCoLC)1300706720 | ||
| 245 | 0 | 0 | |a Nature-inspired cyber security and resiliency : |b fundamentals, techniques and applications / |c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk. |
| 264 | 1 | |a Stevenage : |b Institution of Engineering & Technology, |c 2019. | |
| 264 | 4 | |c ©2019 | |
| 300 | |a 1 online resource (xx, 454 pages) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a IET security series ; |v 10 | |
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Intro; Contents; Preface; About the editors; 1. Nature-inspired analogies and metaphors for cyber security / Elzbieta Rzeszutko and Wojciech Mazurczyk; 1.1 Historical examples of the nature-inspired inventions; 1.2 Classification of the nature-inspired inventions; 1.3 Nature-inspired analogies and metaphors for cyber security: needed or not?; 1.3.1 Adaptability as a key factor in nature; 1.4 Cyber security ecology; 1.4.1 Cyber ecosystem; 1.4.2 Cyber-ecology and its subtypes; 1.4.3 Cyber ecosystem interactions; 1.5 Early nature-inspired terminology in cyber security | |
| 505 | 8 | |a 1.6 Recent nature-inspired analogies and metaphors for cyber security1.6.1 Nature-inspired cyber security inspired by an organism's characteristic feature/defence mechanism; 1.6.2 Nature-inspired cyber security inspired by organisms' interactions; 1.6.3 Generalised attack scenario analogy; 1.7 Conclusion and outlook; References; 2. When to turn to nature-inspired solutions for cyber systems / Nina H. Fefferman; 2.1 Why natural systems are tempting; 2.1.1 Analogous qualities in engineered cyber systems; 2.2 How biological systems develop solutions; 2.2.1 Darwinian evolution | |
| 505 | 8 | |a 2.2.2 Avoiding a common trap: best may not be good2.2.3 Does this make natural systems poor sources of inspiration?; 2.3 Evidence of success from nature-inspired efforts; 2.3.1 A standard pattern in nature-inspired design research; 2.4 A few of nature's tools; 2.4.1 Proximate cues; 2.4.2 Distributed decisions; 2.4.3 Error convergence; 2.5 Synergy among nature's tools; 2.6 Potential pitfalls in nature-inspired algorithms specific to cyber security and resilience; 2.6.1 Coevolutionary arms races; 2.6.2 Designed threats versus evolved threats | |
| 505 | 8 | |a 2.6.3 Trade-offs between security and privacy may be different for each design component2.7 When NOT to use nature-inspired algorithms; 2.8 Conclusions; Acknowledgments; References; 3. Bioinspired collaboration and cyber security / Youna Jung; 3.1 Collaboration; 3.1.1 Computer-supported cooperative work; 3.1.2 Service-oriented architecture; 3.1.3 Online social networks; 3.1.4 Multi-agent systems; 3.2 Bioinspired cooperation; 3.2.1 Cooperation in swarm intelligence; 3.2.2 Coordination in chemistry; 3.3 Access control for bioinspired cooperation; 3.3.1 Traditional access control models | |
| 505 | 8 | |a 3.3.2 Access control models for bioinspired collaboration3.4 Conclusions and future work; References; 4. Immune-based defence and resiliency / Pierre Parrend; 4.1 Introduction; 4.2 Definitions; 4.3 Core contributions; 4.3.1 Immunity basics; 4.3.2 Complexity aspects of the immune system; 4.3.3 Immune properties of natural organisms; 4.4 Applications; 4.4.1 Immuno-engineering; 4.4.2 Artificial immune systems; 4.4.3 AIS for intrusion detection; 4.4.4 Immune properties of artificial systems; 4.4.5 Limitations and perspectives of AIS applications; 4.5 Conclusions and perspectives; References | |
| 505 | 8 | |a 5. Bio-inspired approaches for security and resiliency of network traffic / Christopher S. Oehmen and Elena S. Peterson | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges. | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Biomimetics. | |
| 650 | 0 | |a Computer security. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a El-Alfy, El Sayed M., |d 1968- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjJYjrPqtQ4jvrbwj8Qg8C | |
| 700 | 1 | |a Eltoweissy, Mohamed, |e editor. | |
| 700 | 1 | |a Fulp, Errin W., |e editor. | |
| 700 | 1 | |a Mazurczyk, Wojciech, |e editor. | |
| 776 | 0 | 8 | |i Print version: |a El-Alfy, El-Sayed M. |t Nature-Inspired Cyber Security and Resiliency : Fundamentals, Techniques and Applications. |d Stevenage : Institution of Engineering & Technology, ©2019 |z 9781785616389 |
| 830 | 0 | |a IET security series ; |v 10. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpNICSRFT2/nature-inspired-cyber?kpromoter=marc |y Full text |