Biologically Inspired Computer Security System: The Way Ahead

Author(s):  
Praneet Saurabh ◽  
Bhupendra Verma ◽  
Sanjeev Sharma
1993 ◽  
Vol 2 (1) ◽  
pp. 115-138 ◽  
Author(s):  
Ronald M. Bonesteel
Keyword(s):  

2014 ◽  
pp. 44-50
Author(s):  
Sergei Bezobrazov ◽  
Vladimir Golovko

This paper presents an approach for solving unknown computer viruses detection problem based on the Artificial Immune System (AIS) method, where immune detectors represented neural networks. The AIS is the biologically-inspired technique which have powerful information processing capabilities that makes it attractive for applying in computer security systems. Computer security systems based on AIS principles allow detect unknown malicious code. In this work we are describing model build on the AIS approach in which detectors represent the Learning Vector Quantization (LVQ) neural networks. Basic principles of the biological immune system (BIS) and comparative analysis of unknown computer viruses detection for different antivirus software and our model are presented.


1975 ◽  
Author(s):  
K. G. Walter ◽  
W. F. Ogden ◽  
J. M. Gilligan ◽  
D. D. Schaeffer ◽  
S. I. Schaen

2011 ◽  
Vol 403-408 ◽  
pp. 3495-3502
Author(s):  
Mohit Kumar ◽  
Shiv Prasad Yadav ◽  
Surendra Kumar

Fault tree analysis has been widely used for providing logical functional relationships among subsystems and components of a system and identifying the root causes of the undesired failures in a system. This paper analyzes the reliability of Computer Security System through the method of intuitionistic fuzzy fault tree, which is based on L-R type triangular intuitionistic fuzzy set. In this paper, a new approach of intuitionistic fuzzy fault-tree analysis is proposed to calculate fault interval of system components from integrating expert’s knowledge and experience in terms of providing the possibility of failure of bottom events and to find the most critical system component that affects the reliability of the system, which could be used for managerial decision-making. For numerical verification, the proposed method is applied for the failure analysis problem of Computer Security System to generate the fault-tree, fault-tree nodes, then directly compute the intuitionistic fuzzy fault-tree interval, traditional reliability, and the intuitionistic fuzzy reliability interval.


Author(s):  
Claudia Teresa González-Ramírez ◽  
Leonardo Gómez-Martínez ◽  
José Manuel Colín-Morales ◽  
Mauricio Delgado-Pichardo

Considering that day by day most of the services provided by any organization are being migrated to environments that involve the use of computer equipment, servers and data networks, the multiple attacks suffered by companies, focused on theft, must also be considered. information, falsification, modification of services, impersonations, vulnerabilities in systems, among many things. Despite the great usefulness and all the advantages that networks offer, it cannot be left aside, much less assume that the security of the organization is in optimal conditions, concepts such as implementation, administration and computer security. Therefore, the company must have an Information Leakage Prevention security scheme, based on a security system with the tools that provide these advantages.


Author(s):  
Farah H. A. Jabar ◽  
Janatul Islah Mohammad ◽  
Ahmad Faizal Mohd Zain ◽  
Abu Bakar Hasan

It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.


10.29007/xwpt ◽  
2018 ◽  
Author(s):  
Ripal Patel ◽  
Vivek Tank ◽  
Jinish Brahmbhatt ◽  
Sanchit Puranik ◽  
Khushboo Desai

With the increase in the number of thefts, robberies and encroaching in the world, the existing security system is not sufficient. Hence to circumvent this problem the demand of bio-metric systems is increased, as they provide more dependable and effective means of identity confirmation. One such bio-metric security that has seen an uproar in the recent years is the gait identification. Gait recognition targets fundamentally to address this problem by recognizing people based on the way they walk. First of all, silhouette of the persons is extracted. Moreover, step size of the person is considered as unique feature for representing gait and effectively classify the person based on gait. Finally, features are feed to neural network for classification. The proposed approach gives better accuracy.


2018 ◽  
Vol 31 (1) ◽  
pp. 231
Author(s):  
Fadheela Sabri Abu-Almash

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.            


Author(s):  
Franco Tommasi ◽  
Christian Catalano ◽  
Ivan Taurino

AbstractMan-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. However, most of its many variants involve difficulties that make it not always possible. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings. It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. It will be seen how BitM expands the range of the possible attacker’s actions, at the same time making them easier to implement. Among its features, the absence of the need to install malware of any kind on the victim’s machine and the total control it allows the attacker are to be emphasized.


Nature ◽  
1989 ◽  
Vol 337 (6202) ◽  
pp. 4-4
Author(s):  
Seth Shulman

Sign in / Sign up

Export Citation Format

Share Document