Plant and Salamander Inspired Network Attack Detection and Data Recovery Model

Author:

Sharma Rupam Kumar1,Issac Biju2ORCID,Xin Qin3ORCID,Gadekallu Thippa Reddy45678ORCID,Nath Keshab9ORCID

Affiliation:

1. Department of Computer Science and Engineering, Rajiv Gandhi University, Itanagar 791112, India

2. Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne NE1 8ST, UK

3. Faculty of Science and Technology, University of the Faroe Islands, Vestara Bryggja 15, FO-100 Tórshavn, Faroe Islands

4. School of Information Technology and Engineering, Vellore Institute of Technology & Engineering, Vellore 632014, India

5. Department of Electrical and Computer Engineering, Lebanese American University, Byblos P.O. Box 36, Lebanon

6. Zhongda Group, Haiyan County, Jiaxing 314312, China

7. College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China

8. Division of Research and Development, Lovely Professional University, Phagwara 144401, India

9. Department of Computer Science and Engineering, Indian Institute of Information Technology, Kottayam 686635, India

Abstract

The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC’s 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference77 articles.

1. Demertzis, K., and Iliadis, L. (2015). Computation, Cryptography, and Network Security, Springer.

2. Thakkar, A., and Lohiya, R. (2019). Swarm and Evolutionary Computation, Elseiver.

3. Hybrid flexible neural- tree-based intrusion detection systems;Chen;Int. J. Intell. Syst.,2007

4. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection;Luo;Int. Intell. Syst.,2000

5. Neelima, D., Karthik, J., Aravind John, K., Gowthami, S., and Nayak, J. (2019). Soft Computing in Data Analytics, Springer.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3