2016
DOI: 10.1007/978-3-319-38930-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Systematic View on Cybersecurity Ecology

Abstract: Current network security systems are progressively showing their limitations. One credible estimate is that only about 45% of new threats are detected. Therefore it is vital to find a new direction that cybersecurity development should follow. We argue that the next generation of cybersecurity systems should seek inspiration in nature. This approach has been used before in the first generation of cybersecurity systems; however, since then cyber threats and environment have evolved significantly, and accordingl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 39 publications
0
16
0
Order By: Relevance
“…Using terminologies from ecological biology, the entire CR network can be viewed as an ecosystem [3], where SUs of different spectrum access strategies are different species, the common resource shared by all species are the vacant wireless spectrum, and the fitness of an SU is the utility it received given the profile of spectrum access strategies of all SUs. Two essential operations must be ensured to guarantee the success of the opportunistic access of CR ecosystem:'…”
Section: A Cr Ecosystemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Using terminologies from ecological biology, the entire CR network can be viewed as an ecosystem [3], where SUs of different spectrum access strategies are different species, the common resource shared by all species are the vacant wireless spectrum, and the fitness of an SU is the utility it received given the profile of spectrum access strategies of all SUs. Two essential operations must be ensured to guarantee the success of the opportunistic access of CR ecosystem:'…”
Section: A Cr Ecosystemsmentioning
confidence: 99%
“…In evolutionary aspect, users with different access strategies and behaviors are regarded as different species. Originally, all PUs and most of SUs behave normally, which are considered as native species in a balanced ecosystem [14], [3]. The stealthy MUs involving later try to prevent usable reception on victims by forcing their received SINR lower than the threshold.…”
Section: The Proposed Ecology-based Dos Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Such dynamics are often observed in nature, e.g., between predators and prey, or hosts and parasites. For the case of security, this leads to a continual contention to develop offensive/defensive measures as fast as possible, to at least temporarily dominate the other side [10].…”
Section: Introductionmentioning
confidence: 99%
“…Motivation. Bio-Inspired algorithm development in cybersecurity frequently relies on isolated analogy building between particular threats and specific biological systems [1]. While meticulous care is often taken in building these analogies and then tailoring the borrowed algorithms to meet the needs of cyber systems (e.g.…”
Section: Introductionmentioning
confidence: 99%