Modelling Artificial Immunization Processes to Counter Cyberthreats

This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Symmetry (Basel) 2021-12, Vol.13 (12), p.2453
Hauptverfasser: Zegzhda, Dmitry, Pavlenko, Evgeny, Aleksandrova, Elena
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 12
container_start_page 2453
container_title Symmetry (Basel)
container_volume 13
creator Zegzhda, Dmitry
Pavlenko, Evgeny
Aleksandrova, Elena
description This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.
doi_str_mv 10.3390/sym13122453
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2612848354</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2612848354</sourcerecordid><originalsourceid>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</originalsourceid><addsrcrecordid>eNpNkDtPwzAcxC0EElXpxBeIxIgCfsbxWEU8KhXBAHPkxz_gKomL7Qzh01NUht5yN_x0Jx1C1wTfMabwfZoHwgilXLAztKBYsrJWip-f5Eu0SmmHDxJY8AovUPMSHPS9Hz-Ldcy-89brvtgMwzT6H519GIu3GCykBKnIoWjCNGaIRTMbiPkrgs7pCl10uk-w-vcl-nh8eG-ey-3r06ZZb0tLVZ1L6ahRIJnBhgvMO0ylEwY0MEcZUZQqi22tqJXKuq7WVnBigFvHpKokVmyJbo69-xi-J0i53YUpjofJllaE1rxmgh-o2yNlY0gpQtfuox90nFuC27-j2pOj2C_Mn1su</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2612848354</pqid></control><display><type>article</type><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</creator><creatorcontrib>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</creatorcontrib><description>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</description><identifier>ISSN: 2073-8994</identifier><identifier>EISSN: 2073-8994</identifier><identifier>DOI: 10.3390/sym13122453</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Complex systems ; Computer viruses ; Cybersecurity ; Equilibrium ; Immunization ; Information systems ; Malware ; Pandemics ; Vaccines</subject><ispartof>Symmetry (Basel), 2021-12, Vol.13 (12), p.2453</ispartof><rights>2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</citedby><cites>FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</cites><orcidid>0000-0003-1345-1874 ; 0000-0002-7485-4848</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Zegzhda, Dmitry</creatorcontrib><creatorcontrib>Pavlenko, Evgeny</creatorcontrib><creatorcontrib>Aleksandrova, Elena</creatorcontrib><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><title>Symmetry (Basel)</title><description>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</description><subject>Complex systems</subject><subject>Computer viruses</subject><subject>Cybersecurity</subject><subject>Equilibrium</subject><subject>Immunization</subject><subject>Information systems</subject><subject>Malware</subject><subject>Pandemics</subject><subject>Vaccines</subject><issn>2073-8994</issn><issn>2073-8994</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkDtPwzAcxC0EElXpxBeIxIgCfsbxWEU8KhXBAHPkxz_gKomL7Qzh01NUht5yN_x0Jx1C1wTfMabwfZoHwgilXLAztKBYsrJWip-f5Eu0SmmHDxJY8AovUPMSHPS9Hz-Ldcy-89brvtgMwzT6H519GIu3GCykBKnIoWjCNGaIRTMbiPkrgs7pCl10uk-w-vcl-nh8eG-ey-3r06ZZb0tLVZ1L6ahRIJnBhgvMO0ylEwY0MEcZUZQqi22tqJXKuq7WVnBigFvHpKokVmyJbo69-xi-J0i53YUpjofJllaE1rxmgh-o2yNlY0gpQtfuox90nFuC27-j2pOj2C_Mn1su</recordid><startdate>20211201</startdate><enddate>20211201</enddate><creator>Zegzhda, Dmitry</creator><creator>Pavlenko, Evgeny</creator><creator>Aleksandrova, Elena</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0003-1345-1874</orcidid><orcidid>https://orcid.org/0000-0002-7485-4848</orcidid></search><sort><creationdate>20211201</creationdate><title>Modelling Artificial Immunization Processes to Counter Cyberthreats</title><author>Zegzhda, Dmitry ; Pavlenko, Evgeny ; Aleksandrova, Elena</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c298t-7d2b9e73b0b4504f027d5beae3d2319229c0c892c79cdf8ac541be4cd37967093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Complex systems</topic><topic>Computer viruses</topic><topic>Cybersecurity</topic><topic>Equilibrium</topic><topic>Immunization</topic><topic>Information systems</topic><topic>Malware</topic><topic>Pandemics</topic><topic>Vaccines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zegzhda, Dmitry</creatorcontrib><creatorcontrib>Pavlenko, Evgeny</creatorcontrib><creatorcontrib>Aleksandrova, Elena</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Symmetry (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zegzhda, Dmitry</au><au>Pavlenko, Evgeny</au><au>Aleksandrova, Elena</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modelling Artificial Immunization Processes to Counter Cyberthreats</atitle><jtitle>Symmetry (Basel)</jtitle><date>2021-12-01</date><risdate>2021</risdate><volume>13</volume><issue>12</issue><spage>2453</spage><pages>2453-</pages><issn>2073-8994</issn><eissn>2073-8994</eissn><abstract>This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/sym13122453</doi><orcidid>https://orcid.org/0000-0003-1345-1874</orcidid><orcidid>https://orcid.org/0000-0002-7485-4848</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2073-8994
ispartof Symmetry (Basel), 2021-12, Vol.13 (12), p.2453
issn 2073-8994
2073-8994
language eng
recordid cdi_proquest_journals_2612848354
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Complex systems
Computer viruses
Cybersecurity
Equilibrium
Immunization
Information systems
Malware
Pandemics
Vaccines
title Modelling Artificial Immunization Processes to Counter Cyberthreats
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T03%3A17%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modelling%20Artificial%20Immunization%20Processes%20to%20Counter%20Cyberthreats&rft.jtitle=Symmetry%20(Basel)&rft.au=Zegzhda,%20Dmitry&rft.date=2021-12-01&rft.volume=13&rft.issue=12&rft.spage=2453&rft.pages=2453-&rft.issn=2073-8994&rft.eissn=2073-8994&rft_id=info:doi/10.3390/sym13122453&rft_dat=%3Cproquest_cross%3E2612848354%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2612848354&rft_id=info:pmid/&rfr_iscdi=true