Tuesday, 5 May 2015

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet itself. He is an engineer’s engineer.

Sean is serving as a guest editor for a feature topic for IEEE Communications Magazine, the industry’s source for coverage of advances in communications and networking.

The topic of the special focus area Sean is helping edit is “Bio-Inspired Cyber Security and Networking.”

A call for papers has just been released on this topic which captures its importance to the community. The meat of that solicitation is provided below.

There is widespread movement towards this topic from many disciplines. CIOs and CISOs are approaching this topic from their perspective, seeking ways to rapidly respond to indicators of compromise and share information with each other, for example. CTOs and enterprise architects are seeking technologies to enhance resilience in ways that model biology. Policy-makers and strategists are seeking concepts that bring this all together. All these disciplines can benefit from the increased focus this IEEE activity will generate.

You can help move this concept forward by either submitting papers yourself on the topic or by getting the call for papers into the hands of others who might submit topics.

So please help spread the word on this call for papers. Engineers from across industry are already thinking of concepts like these and by publishing with IEEE can help us all move forward on this very important topic.

Nature is Earth’s most amazing invention machine for solving problems and adapting to significant environmental changes. Its ability to address complex, large-scale problems with robust, adaptable, and efficient solutions results from many years of selection, genetic drift and mutations.  Thus, it is not surprising that inventors and researchers often look to natural systems for inspiration and methods for solving problems in human-created artificial environments.  This has resulted in the development of evolutionary algorithms including genetic algorithms and swarm algorithms, and of classifier and pattern-detection algorithms, such as neural networks, for solving hard computational problems.

A natural evolutionary driver is to survive long enough to create a next-generation of descendants and ensure their survival.  One factor in survival is an organism’s ability to defend against attackers, both predators and parasites, and against rapid changes in environmental conditions.  Analogously, networks and communications systems use cyber security to defend their assets against cyber criminals, hostile organizations, hackers, activists, and sudden changes in the network environment (e.g., DDoS attacks).  Many of the defense methods used by natural organisms may be mapped to cyber space to implement effective cyber security.  Some examples include immune systems, invader detection, friend vs. foe, camouflage, mimicry, evasion, etc.  Many cyber security technologies and systems in common use today have their roots in bio-inspired methods, including anti-virus, intrusion detection, threat behavior analysis, attribution, honeypots, counterattack, and the like.  As the threats evolve to evade current cyber security technologies, similarly the bio-inspired security and defense technologies evolve to counter the threat.

Topics of interests include, but are not limited to:

  • Bio-inspired anomaly & intrusion detection
  • Adaptation algorithms for cyber security & networking
  • Biometrics related to cyber security & networking
  • Bio-inspired security and networking algorithms & technologies
  • Biomimetics related to cyber security & networking
  • Bio-inspired cyber threat intelligence methods and systems
  • Moving-target techniques
  • Network Artificial Immune Systems
  • Adaptive and Evolvable Systems
  • Neural networks, evolutionary algorithms, and genetic algorithms for cyber security & networking
  • Prediction techniques for cyber security & networking
  • Information hiding solutions (steganography, watermarking) and detection for network traffic
  • Cooperative defense systems
  • Bio-inspired algorithms for dependable networks

Source: http://ift.tt/1PmD6tp



from cyber security caucus http://ift.tt/1dL9ryF
via IFTTT

No comments:

Post a Comment