Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead
DOI:
https://doi.org/10.13052/jwe1540-9589.21416Keywords:
Web Data Security, Security Risks, Nature-inspired Cyber Security, Cyber Threat AnalysisAbstract
Web Applications are becoming more sophisticated to cater the ever-growing demand of data processing and computing. Fast technological advancements in web engineering not only facilitate data intensive and high-performance computing, but also raise serious concerns on security. Cyber threats are also ramping up at the equal pace and attackers are now more organised and equipped with high-end servers. The Data over Web needs to be more authenticated and reliable. Data Provenance-aware methods are capable of identification of data breaches and manipulation through various attacks. They analyse underlying data for the potential threats to ensure protection against various attacks. Cyber Security Practitioners are witnessing severe issues in securing the Web Data and applications as the security risks are growing rapidly due to the sudden eruption in internet usage due to the pandemic in the last few years. People and organisations are relying more on Internet and web applications than ever before. The efforts for securing the web data on such a massive scale is premature to counter the ever-evolving attack attempts. Nature-inspired Cyber Security (NICS) facilitates the development and implementation of robust defensive mechanisms which are more adaptive and highly tolerant to online malicious programs. These methods are also capable of dealing with the common algorithmic issues like incompleteness and uncertainty of information and to provide a high-level security mechanism by effectively implementing the bio-inspired methodologies like deception, and camouflage etc. This article will attempt to explore the effectiveness of NICS in web data and application security to provide smart security methods.
Downloads
References
SK Shandilya, S Upadhyay, A Kumar, AK Nagar, AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis, Future Generation Computer Systems, Elsevier, 2022
SK Shandilya, Design and Analysis of NICS Based Web Attack Detection for Advanced Intrusion Detection System, Iberoamerican Knowledge Graphs and Semantic Web, Springer, 2021
Gautam, R., Kaur, P. & Sharma, M. A comprehensive review on nature inspired computing algorithms for the diagnosis of chronic disorders in human beings. Prog Artificial Intelligence 8, 401–424, 2019
Michael Warner. Cybersecurity: A pre-history. Intelligence and National Security, 27, 2012
Hong S. Choi M. S. Lee S. J. Kim T. W. Lee S. W. Ha B. N. Lim, I. H. Security protocols against cyber-attacks in the distribution automation system. IEEE Transactions on Power Delivery, 25(1):448–455, 2010
Robert Dewar. The “triptych of cyber security”: A classification of active cyber defense. International Conference on Cyber Conflict, CYCON, pages 7–21, 2014
Dewar, Robert, Active Cyber Defense, 2017
Ricardo Neisse, Gary Steri, Igor Nai Fovino, and Gianmarco Baldini. Seckit: A model-based security toolkit for the internet of things. Computers Security, 58, 2015
Neal Wagner, Cem Ş. Sahin, Jaime Pena, and William W. Streilein. Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach. pages 1–25, 2019
Vajiheh Hajisalem and Shahram Babaie. A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Computer Networks, 136, 02 2018