A case study in tailoring a bio-inspired cyber-security algorithm

Designing anomaly detection for multilayer networks

Gonzalo Suárez, Lazaros Gallos, Nina H. Fefferman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Although bio-inspired designs for cybersecurity have yielded many elegant solutions to challenging problems, the vast majority of these efforts have been ad hoc analogies between the natural and human-designed systems. We propose to improve on the current approach of searching through the vast diversity of existing natural algorithms for one most closely resembling each new cybersecurity challenge, and then trying to replicate it in a designed cyber setting. Instead, we suggest that researchers should follow a protocol of functional abstraction, considering which features of the natural algorithm provide the efficiency/effectiveness in the real world, and then use those abstracted features as design components to build purposeful, tailored (perhaps even optimized) solutions. Here, we demonstrate how this can work by considering a case study employing this method. We design an extension of an existing (and ad hoc-created) algorithm, DIAMoND, for application beyond its originally intended solution space (detection of Distributed Denial of Service attacks in simple networks) to function on multilayer networks. We show how this protocol provides insights that might be harder or take longer to discover by direct analogy-building alone; in this case, we see that differential weighting of shared information by the providing network layer is likely to be effective.

Original languageEnglish (US)
Title of host publicationProceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages281-286
Number of pages6
ISBN (Print)9780769563497
DOIs
StatePublished - Aug 2 2018
Event2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018 - San Francisco, United States
Duration: May 24 2018 → …

Publication series

NameProceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018

Other

Other2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018
CountryUnited States
CitySan Francisco
Period5/24/18 → …

Fingerprint

Multilayers
Network protocols
Network layers
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Keywords

  • Bio inspired algorithm
  • Cybersecurity
  • Multilayer networks

Cite this

Suárez, G., Gallos, L., & Fefferman, N. H. (2018). A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks. In Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018 (pp. 281-286). [8424661] (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SPW.2018.00045
Suárez, Gonzalo ; Gallos, Lazaros ; Fefferman, Nina H. / A case study in tailoring a bio-inspired cyber-security algorithm : Designing anomaly detection for multilayer networks. Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 281-286 (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018).
@inproceedings{c63447639e6f4e0f9f20e7655def1624,
title = "A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks",
abstract = "Although bio-inspired designs for cybersecurity have yielded many elegant solutions to challenging problems, the vast majority of these efforts have been ad hoc analogies between the natural and human-designed systems. We propose to improve on the current approach of searching through the vast diversity of existing natural algorithms for one most closely resembling each new cybersecurity challenge, and then trying to replicate it in a designed cyber setting. Instead, we suggest that researchers should follow a protocol of functional abstraction, considering which features of the natural algorithm provide the efficiency/effectiveness in the real world, and then use those abstracted features as design components to build purposeful, tailored (perhaps even optimized) solutions. Here, we demonstrate how this can work by considering a case study employing this method. We design an extension of an existing (and ad hoc-created) algorithm, DIAMoND, for application beyond its originally intended solution space (detection of Distributed Denial of Service attacks in simple networks) to function on multilayer networks. We show how this protocol provides insights that might be harder or take longer to discover by direct analogy-building alone; in this case, we see that differential weighting of shared information by the providing network layer is likely to be effective.",
keywords = "Bio inspired algorithm, Cybersecurity, Multilayer networks",
author = "Gonzalo Su{\'a}rez and Lazaros Gallos and Fefferman, {Nina H.}",
year = "2018",
month = "8",
day = "2",
doi = "https://doi.org/10.1109/SPW.2018.00045",
language = "English (US)",
isbn = "9780769563497",
series = "Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "281--286",
booktitle = "Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018",
address = "United States",

}

Suárez, G, Gallos, L & Fefferman, NH 2018, A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks. in Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018., 8424661, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, Institute of Electrical and Electronics Engineers Inc., pp. 281-286, 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, San Francisco, United States, 5/24/18. https://doi.org/10.1109/SPW.2018.00045

A case study in tailoring a bio-inspired cyber-security algorithm : Designing anomaly detection for multilayer networks. / Suárez, Gonzalo; Gallos, Lazaros; Fefferman, Nina H.

Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 281-286 8424661 (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A case study in tailoring a bio-inspired cyber-security algorithm

T2 - Designing anomaly detection for multilayer networks

AU - Suárez, Gonzalo

AU - Gallos, Lazaros

AU - Fefferman, Nina H.

PY - 2018/8/2

Y1 - 2018/8/2

N2 - Although bio-inspired designs for cybersecurity have yielded many elegant solutions to challenging problems, the vast majority of these efforts have been ad hoc analogies between the natural and human-designed systems. We propose to improve on the current approach of searching through the vast diversity of existing natural algorithms for one most closely resembling each new cybersecurity challenge, and then trying to replicate it in a designed cyber setting. Instead, we suggest that researchers should follow a protocol of functional abstraction, considering which features of the natural algorithm provide the efficiency/effectiveness in the real world, and then use those abstracted features as design components to build purposeful, tailored (perhaps even optimized) solutions. Here, we demonstrate how this can work by considering a case study employing this method. We design an extension of an existing (and ad hoc-created) algorithm, DIAMoND, for application beyond its originally intended solution space (detection of Distributed Denial of Service attacks in simple networks) to function on multilayer networks. We show how this protocol provides insights that might be harder or take longer to discover by direct analogy-building alone; in this case, we see that differential weighting of shared information by the providing network layer is likely to be effective.

AB - Although bio-inspired designs for cybersecurity have yielded many elegant solutions to challenging problems, the vast majority of these efforts have been ad hoc analogies between the natural and human-designed systems. We propose to improve on the current approach of searching through the vast diversity of existing natural algorithms for one most closely resembling each new cybersecurity challenge, and then trying to replicate it in a designed cyber setting. Instead, we suggest that researchers should follow a protocol of functional abstraction, considering which features of the natural algorithm provide the efficiency/effectiveness in the real world, and then use those abstracted features as design components to build purposeful, tailored (perhaps even optimized) solutions. Here, we demonstrate how this can work by considering a case study employing this method. We design an extension of an existing (and ad hoc-created) algorithm, DIAMoND, for application beyond its originally intended solution space (detection of Distributed Denial of Service attacks in simple networks) to function on multilayer networks. We show how this protocol provides insights that might be harder or take longer to discover by direct analogy-building alone; in this case, we see that differential weighting of shared information by the providing network layer is likely to be effective.

KW - Bio inspired algorithm

KW - Cybersecurity

KW - Multilayer networks

UR - http://www.scopus.com/inward/record.url?scp=85052236533&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85052236533&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/SPW.2018.00045

DO - https://doi.org/10.1109/SPW.2018.00045

M3 - Conference contribution

SN - 9780769563497

T3 - Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018

SP - 281

EP - 286

BT - Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Suárez G, Gallos L, Fefferman NH. A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks. In Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 281-286. 8424661. (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018). https://doi.org/10.1109/SPW.2018.00045