Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Jun 14;23(12):5562.
doi: 10.3390/s23125562.

Plant and Salamander Inspired Network Attack Detection and Data Recovery Model

Affiliations

Plant and Salamander Inspired Network Attack Detection and Data Recovery Model

Rupam Kumar Sharma et al. Sensors (Basel). .

Abstract

The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC's 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra.

Keywords: bio-inspired algorithm; evolutionary computing; intrusion detection; network security; ransomware.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Taxonomy of Evolutionary Computation used in IDS.
Figure 2
Figure 2
Real time feature extraction for IDS [31].
Figure 3
Figure 3
Comparative bar chart for different implemented methods.
Figure 4
Figure 4
The zig-zag plant defense model [31].
Figure 5
Figure 5
Guard model in plants.
Figure 6
Figure 6
Elements in salamander limb regeneration.
Figure 7
Figure 7
Molecular metabolism for wound recovery and limb regeneration in the salamander.
Figure 8
Figure 8
Taxonomy of different Machine Learning algorithms used in IDS.
Figure 9
Figure 9
Transmission of malicious program flow in a network.
Figure 10
Figure 10
LAN topology.
Figure 11
Figure 11
Experimental results [49]: (a) SSH worm infection spread; (b) Slowloris detection; (c) TCP-Syn flood attack; (d) File deletion comparison under Ransomware like attack.
Figure 12
Figure 12
Packet drop comparison between Snort and PIRIDS.
Figure 13
Figure 13
File recovery: (a) Multicast Hello Packet; (b) Database of critical node peers; (c) File distribution to peers for backup-script; (d) File distribution to peers for backup-database; (e) Backup request from peers and recovery initialization; (f) ECM formation after fragments of files received from peers. Note: The ‘star’ symbol in all the figures is the Linux terminal prompt symbol and * is for comments.
Figure 14
Figure 14
Backup time comparison.
Figure 15
Figure 15
Restore time comparison.
Figure 16
Figure 16
Different time complexity order for different detector agents.
Figure 17
Figure 17
Different space complexity order for different detector agents.

Similar articles

Cited by

References

    1. Demertzis K., Iliadis L. Computation, Cryptography, and Network Security. Springer; Berlin/Heidelberg, Germany: 2015. A bio-inspired hybrid artificial intelligence framework for cybersecurity; pp. 161–193.
    1. Thakkar A., Lohiya R. Swarm and Evolutionary Computation. Elseiver; Amsterdam, The Netherlands: 2019. Role of Swarm and evolutionary algorithms for intrusion detection system: A survey.
    1. Chen Y., Abraham A., Yang B. Hybrid flexible neural- tree-based intrusion detection systems. Int. J. Intell. Syst. 2007;22:337–352. doi: 10.1002/int.20203. - DOI
    1. Luo J., Bridges S.M. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. Int. Intell. Syst. 2000;15:687–703. doi: 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X. - DOI
    1. Neelima D., Karthik J., Aravind John K., Gowthami S., Nayak J. Soft Computing in Data Analytics. Springer; Singapore: 2019. Soft Computing-Based Intrusion Detection Approaches: An Analytical Study; pp. 635–651.