Cargando…

Plant and Salamander Inspired Network Attack Detection and Data Recovery Model

The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of...

Descripción completa

Detalles Bibliográficos
Autores principales: Sharma, Rupam Kumar, Issac, Biju, Xin, Qin, Gadekallu, Thippa Reddy, Nath, Keshab
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302505/
https://www.ncbi.nlm.nih.gov/pubmed/37420729
http://dx.doi.org/10.3390/s23125562
_version_ 1785065060406657024
author Sharma, Rupam Kumar
Issac, Biju
Xin, Qin
Gadekallu, Thippa Reddy
Nath, Keshab
author_facet Sharma, Rupam Kumar
Issac, Biju
Xin, Qin
Gadekallu, Thippa Reddy
Nath, Keshab
author_sort Sharma, Rupam Kumar
collection PubMed
description The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC’s 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra.
format Online
Article
Text
id pubmed-10302505
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103025052023-06-29 Plant and Salamander Inspired Network Attack Detection and Data Recovery Model Sharma, Rupam Kumar Issac, Biju Xin, Qin Gadekallu, Thippa Reddy Nath, Keshab Sensors (Basel) Article The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC’s 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra. MDPI 2023-06-14 /pmc/articles/PMC10302505/ /pubmed/37420729 http://dx.doi.org/10.3390/s23125562 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sharma, Rupam Kumar
Issac, Biju
Xin, Qin
Gadekallu, Thippa Reddy
Nath, Keshab
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title_full Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title_fullStr Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title_full_unstemmed Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title_short Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
title_sort plant and salamander inspired network attack detection and data recovery model
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302505/
https://www.ncbi.nlm.nih.gov/pubmed/37420729
http://dx.doi.org/10.3390/s23125562
work_keys_str_mv AT sharmarupamkumar plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel
AT issacbiju plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel
AT xinqin plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel
AT gadekalluthippareddy plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel
AT nathkeshab plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel