Nature-inspired cyber security and resiliency

El Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk

Research output: Book/ReportBookpeer-review

2 Scopus citations

Abstract

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; natureinspired cryptography and cryptanalysis, and more.

Original languageEnglish
PublisherInstitution of Engineering and Technology
Number of pages480
ISBN (Electronic)9781785616389
DOIs
StatePublished - 1 Jan 2019

Bibliographical note

Publisher Copyright:
© The Institution of Engineering and Technology 2019.

Keywords

  • Biomimetics
  • Fault tolerant computing
  • Security of data
  • Trusted computing

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Nature-inspired cyber security and resiliency'. Together they form a unique fingerprint.

Cite this