You are here: Home Contents V12 N3 V12N3_Hassan.html
Personal tools

When Biology Meets Cyber-Security



Full text

Journal of Information Systems Security
Volume 12, Number 3 (2016)
Pages 177199
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Mohamed Hassan — Staffordshire University, UK
Alexios Mylonas — Staffordshire University, UK
Stilianos Vidalis — University of Hertfordshire, UK
Information Institute Publishing, Washington DC, USA




From the observations made on biology and nature, it can be seen that biological living creatures are very efficient in the functions of recognizing and eliminating danger around them. Their ability to adapt within the surrounding environment and self-healing capability are remarkable. Computers’ defensive systems have been approached by various biological inspired techniques. However, very few surveys examined the current cyber security status - in which most of them are focused on one or two methods (i.e. Artificial Immune System - AIS and/or Genetic Algorithms approaches).




Adaptive System, Cyber-Security Domain, Biological-inspired Computing, Fuzzy Logic, IDS




Abraham, A., Grosan, C. and Martin-vide, C. (2007). Evolutionary design of intrusion detection programs, International Journal of Network Security 4(3), 328339.

Amza, C., Leordeanu, C. and Cristea, V. (2011). Hybrid network intrusion detection, in Intelligent Computer Communication and Processing (ICCP), 2011 IEEE International Conference, pp. 503–510.

Booz, Allen, H. (2011). Asserting global leadership in the cyber domain.

Catania, C. A. and Garino, C. G. (2012). Automatic network intrusion detection: Current techniques and open issues, Computers and Electrical Engineering 38(5),1062-1072

Chaure, R. and Shandilya, S. K. (2010). Firewall anamolies detection and removal techniques a survey, International Journal on Emerging Technologies 1(1), 71–74.

Cisco (2015a). Cisco advanced malware protection for networks data sheet.

Cisco (2015b). Cisco firepower 8000 firewall data sheet. appliances/datasheet-c78-732955.pdf

Crosbie, M. and Spafford, G. (1995). Applying genetic programming to intrusion detection, in Working Notes for the AAAI Symposium on Genetic Programming, MIT, Cambridge, MA, USA: AAAI, pp. 1–8.

Dhak, B. S. and Lade, S. (2012). An evolutionary approach to intrusion detection system using genetic algorithm, International Journal of Emerging Technology and Advanced Engineering 2(12), 632–637.

Fries, T. (2010). Evolutionary optimization of a fuzzy rule-based network intrusion detection sys- tem, in Fuzzy Information Processing Society (NAFIPS), 2010 Annual Meeting of the North American, pp. 1–6.

Garca-Teodoro, P., Daz-Verdejo, J., Maci-Fernndez, G. and Vzquez, E. (2009). Anomaly-based net- work intrusion detection techniques, systems and challenges, Computers and Security 28(12), 18– 28.

Gomez, J. and Dasgupta, D. (2002). Evolving fuzzy classifiers for intrusion detection, in Workshop on Information Assurance.

Gong, R. H., Zulkernine, M. and Abolmaesumi, P. (2005). A software implementation of a genetic algorithm based approach to network intrusion detection, in Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 7695–2294.

Gouda, M. G. and Liu, A. X. (2007). Structured firewall design, Computer Networks 51(4), 1106–1120.

Haag, C., Lamont, G., Williams, P. and Peterson, G. (2007). An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions, in L. de Castro, F. Von Zuben and H. Knidel, eds, Artificial Immune Systems, Vol. 4628 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 420–435.

Hassan, M., Vidalis, S. and Mylonas, A. (2015). Cell based intrusion prevention system, in 14th European Conference on Information Warfare and Security ECCWS 2015, UK.

Helmer, G., Wong, J. S. K., Honavar, V. G. and Miller, L. (2002). Automated discovery of concise predictive rules for intrusion detection, J. Syst. Softw. 60(3), 165–175.

Ioannidis, S., Keromytis, A. D., Bellovin, S. M. and Smith, J. M. (2000). Implementing a distributed firewall, in Proceedings of the 7th ACM Conference on Computer and Communications Security ACM, 190–199.

Kenneth, K., Frank, M., Kelly, R. J. R. and Byrd, T. A. (2003). Defense mechanisms of biological cells: A framework for network security thinking.

Kim, J., Bentley, P. J., Aickelin, U., Greensmith, J., Tedesco, G. and Twycross, J. (2007). Immune system approaches to intrusion detection - a review, Natural Computing 6(4), 413–466.

LaRoche, P., Zincir-Heywood, N. and Heywood, M. I. (2009). Evolving tcp/ip packets: a case study of port scans, in Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications, IEEE Press, pp. 281–288.

Lee, W., Stolfo, S. J. and Mok, K. W. (2000). Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review 14(6), 533–567.

Li, W. (2004). Using genetic algorithm for network intrusion detection, ECSG.

Ofria, C., Adami, C. and Collier, T. C. (2002). Design of evolvable computer languages, Evolutionary Computation IEEE Transactions on 6(4), 420–424.

Ojugo, A., Eboka, A., Okonta, O., (Mrs), R. Y. and Aghware, F. (2012). Genetic algorithm rule-based intrusion detection system (gaids), Journal of Emerging Trends in Computing and Information Sciences 3(8), 1118–1194.

Panda, M., Abraham, A. and Patra, M. R. (2012). A hybrid intelligent approach for network intrusion detection, Procedia Engineering 30(0), 1–9.

Powers, S. T. and He, J. (2008). A hybrid artificial immune system and self organising map for network intrusion detection, Information Sciences 178(15), 3024 – 3042.

Roubos, J. A., Setnes, M. and Abonyi, J. (2003), Learning fuzzy classification rules from labeled data, Information Sciences 150(12), 77–93. Recent Advances in Soft Computing.

Rowland, C. (2002). Intrusion detection system. US Patent 6,405,318.

Su, M.-Y., Yu, G.-J. and Lin, C.-Y. (2009). A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach, Computers and Security 28(5), 301–309.

Sujatha, K. P., Priya, S. C. and A., K. (2012). Network intrusion detection system using genetic network programming with support vector machine, in Proceedings of the International Conference on Advances in Computing, Communications and Informatics, ICACCI ’12, ACM, New York, NY, USA, pp. 645–649.

Tettamanzi, A. and Tomassini, M. (1998). Soft Computing, Integrating Evolutionary, Neural, and Fuzzy Systems, 1st edn, Springer.

Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y. and Lin, W.-Y. (2009). Intrusion detection by machine learning: A review, Expert Systems with Applications 36(10), 11994 – 12000.

Wegman, E. J. and Marchette, D. J. (2003). On some techniques for streaming data: A case study of internet packet headers.

Williams, L. R. (2011). Artificial cells as reified quines,

Wu, S. X. and Banzhaf, W. (2010). The use of computational intelligence in intrusion detection systems: A review, Applied Soft Computing 10(1), 1–35.

Zeleznikow, J. and Nolan, J. R. (2001). Using soft computing to build real world intelligent decision support systems in uncertain domains, Decision Support Systems 31(2), 263–285.