Cargando…
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model
The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302505/ https://www.ncbi.nlm.nih.gov/pubmed/37420729 http://dx.doi.org/10.3390/s23125562 |
_version_ | 1785065060406657024 |
---|---|
author | Sharma, Rupam Kumar Issac, Biju Xin, Qin Gadekallu, Thippa Reddy Nath, Keshab |
author_facet | Sharma, Rupam Kumar Issac, Biju Xin, Qin Gadekallu, Thippa Reddy Nath, Keshab |
author_sort | Sharma, Rupam Kumar |
collection | PubMed |
description | The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC’s 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra. |
format | Online Article Text |
id | pubmed-10302505 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103025052023-06-29 Plant and Salamander Inspired Network Attack Detection and Data Recovery Model Sharma, Rupam Kumar Issac, Biju Xin, Qin Gadekallu, Thippa Reddy Nath, Keshab Sensors (Basel) Article The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC’s 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra. MDPI 2023-06-14 /pmc/articles/PMC10302505/ /pubmed/37420729 http://dx.doi.org/10.3390/s23125562 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sharma, Rupam Kumar Issac, Biju Xin, Qin Gadekallu, Thippa Reddy Nath, Keshab Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title_full | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title_fullStr | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title_full_unstemmed | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title_short | Plant and Salamander Inspired Network Attack Detection and Data Recovery Model |
title_sort | plant and salamander inspired network attack detection and data recovery model |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302505/ https://www.ncbi.nlm.nih.gov/pubmed/37420729 http://dx.doi.org/10.3390/s23125562 |
work_keys_str_mv | AT sharmarupamkumar plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel AT issacbiju plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel AT xinqin plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel AT gadekalluthippareddy plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel AT nathkeshab plantandsalamanderinspirednetworkattackdetectionanddatarecoverymodel |