Modelling Artificial Immunization Processes to Counter Cyberthreats
This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune m...
Gespeichert in:
Veröffentlicht in: | Symmetry (Basel) 2021-12, Vol.13 (12), p.2453 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 12 |
container_start_page | 2453 |
container_title | Symmetry (Basel) |
container_volume | 13 |
creator | Zegzhda, Dmitry Pavlenko, Evgeny Aleksandrova, Elena |
description | This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats. |
doi_str_mv | 10.3390/sym13122453 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2612848354</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2612848354</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</originalsourceid><addsrcrecordid>eNpNkDtPwzAcxC0EElXpxBeIxIgCfsbxWEU8KhXBAHPkxz_gKomL7Qzh01NUht5yN_x0Jx1C1wTfMabwfZoHwgilXLAztKBYsrJWip-f5Eu0SmmHDxJY8AovUPMSHPS9Hz-Ldcy-89brvtgMwzT6H519GIu3GCykBKnIoWjCNGaIRTMbiPkrgs7pCl10uk-w-vcl-nh8eG-ey-3r06ZZb0tLVZ1L6ahRIJnBhgvMO0ylEwY0MEcZUZQqi22tqJXKuq7WVnBigFvHpKokVmyJbo69-xi-J0i53YUpjofJllaE1rxmgh-o2yNlY0gpQtfuox90nFuC27-j2pOj2C_Mn1su</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2612848354</pqid></control><display><type>article</type><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</creator><creatorcontrib>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</creatorcontrib><description>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</description><identifier>ISSN: 2073-8994</identifier><identifier>EISSN: 2073-8994</identifier><identifier>DOI: 10.3390/sym13122453</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Complex systems ; Computer viruses ; Cybersecurity ; Equilibrium ; Immunization ; Information systems ; Malware ; Pandemics ; Vaccines</subject><ispartof>Symmetry (Basel), 2021-12, Vol.13 (12), p.2453</ispartof><rights>2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</citedby><cites>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</cites><orcidid>0000-0003-1345-1874 ; 0000-0002-7485-4848</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Zegzhda, Dmitry</creatorcontrib><creatorcontrib>Pavlenko, Evgeny</creatorcontrib><creatorcontrib>Aleksandrova, Elena</creatorcontrib><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><title>Symmetry (Basel)</title><description>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</description><subject>Complex systems</subject><subject>Computer viruses</subject><subject>Cybersecurity</subject><subject>Equilibrium</subject><subject>Immunization</subject><subject>Information systems</subject><subject>Malware</subject><subject>Pandemics</subject><subject>Vaccines</subject><issn>2073-8994</issn><issn>2073-8994</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkDtPwzAcxC0EElXpxBeIxIgCfsbxWEU8KhXBAHPkxz_gKomL7Qzh01NUht5yN_x0Jx1C1wTfMabwfZoHwgilXLAztKBYsrJWip-f5Eu0SmmHDxJY8AovUPMSHPS9Hz-Ldcy-89brvtgMwzT6H519GIu3GCykBKnIoWjCNGaIRTMbiPkrgs7pCl10uk-w-vcl-nh8eG-ey-3r06ZZb0tLVZ1L6ahRIJnBhgvMO0ylEwY0MEcZUZQqi22tqJXKuq7WVnBigFvHpKokVmyJbo69-xi-J0i53YUpjofJllaE1rxmgh-o2yNlY0gpQtfuox90nFuC27-j2pOj2C_Mn1su</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Zegzhda, Dmitry</creator><creator>Pavlenko, Evgeny</creator><creator>Aleksandrova, Elena</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0003-1345-1874</orcidid><orcidid>https://orcid.org/0000-0002-7485-4848</orcidid></search><sort><creationdate>20211201</creationdate><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><author>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Complex systems</topic><topic>Computer viruses</topic><topic>Cybersecurity</topic><topic>Equilibrium</topic><topic>Immunization</topic><topic>Information systems</topic><topic>Malware</topic><topic>Pandemics</topic><topic>Vaccines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zegzhda, Dmitry</creatorcontrib><creatorcontrib>Pavlenko, Evgeny</creatorcontrib><creatorcontrib>Aleksandrova, Elena</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Symmetry (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zegzhda, Dmitry</au><au>Pavlenko, Evgeny</au><au>Aleksandrova, Elena</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modelling Artificial Immunization Processes to Counter Cyberthreats</atitle><jtitle>Symmetry (Basel)</jtitle><date>2021-12-01</date><risdate>2021</risdate><volume>13</volume><issue>12</issue><spage>2453</spage><pages>2453-</pages><issn>2073-8994</issn><eissn>2073-8994</eissn><abstract>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/sym13122453</doi><orcidid>https://orcid.org/0000-0003-1345-1874</orcidid><orcidid>https://orcid.org/0000-0002-7485-4848</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2073-8994 |
ispartof | Symmetry (Basel), 2021-12, Vol.13 (12), p.2453 |
issn | 2073-8994 2073-8994 |
language | eng |
recordid | cdi_proquest_journals_2612848354 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Complex systems Computer viruses Cybersecurity Equilibrium Immunization Information systems Malware Pandemics Vaccines |
title | Modelling Artificial Immunization Processes to Counter Cyberthreats |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T03%3A17%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modelling%20Artificial%20Immunization%20Processes%20to%20Counter%20Cyberthreats&rft.jtitle=Symmetry%20(Basel)&rft.au=Zegzhda,%20Dmitry&rft.date=2021-12-01&rft.volume=13&rft.issue=12&rft.spage=2453&rft.pages=2453-&rft.issn=2073-8994&rft.eissn=2073-8994&rft_id=info:doi/10.3390/sym13122453&rft_dat=%3Cproquest_cross%3E2612848354%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2612848354&rft_id=info:pmid/&rfr_iscdi=true |