ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Poonam Yadav

Email(s): Poonam.chawhan@gmail.com

DOI: 10.5958/2231-3915.2020.00009.7   

Address: Ms. Poonam Yadav
Assistant Professor, Department of Computer Science, Shri Shankaracharya Mahavidhyalaya, Junwani, Bhilai CG.
*Corresponding Author

Published In:   Volume - 10,      Issue - 1,     Year - 2020


ABSTRACT:
Nature is the best creation of the earth which we see in our daily life. Nature gives us problem solving methods with how to accept the environmental changes. Researcher also look for the solving their problem inspired with nature. These methods help to solve the problem in artificial atmosphere. Current cyber security system inherent limitation such as absence of self awareness and self correcting methods, disability to diagnose configuration fault and conflict resolution due to multiparty management of security infrastructure. Nature inspired biological system has build-in attractive quality to adapt varying environment conditions, inherent flexibility to failures and damages, The system employs a hybrid approach that combines nature-inspired optimization methods with simulation modeling to construct and evaluate candidate architectures, and adapt to changing threat levels. This research paper addresses an important gap in the area of cyber security to generate optimal/near-optimal security decisions in real time which has not been explored for improving cyber security.


Cite this article:
Poonam Yadav. A taxonomy review of Nature Inspired Algorithms on cyber security for communication and networking. Int. J. Tech. 2020; 10(1):47-52. doi: 10.5958/2231-3915.2020.00009.7


REFERENCES:
1.    Neal Wagner, Cem ¸ S. ¸ Sahin, Jaime Pena, and William W. Streilein, "A Nature-inspired Decision System for Secure Cyber Network Architecture", MIT Lincoln Laboratory Lexington, MA, USA.
2.    Fielder, “Decision support approaches for cyber security investment,” Decision Support Systems, vol. 86, pp. 13–23, 2016.
3.    N. Wagner et al., “Towards automated cyber decision support: A case study on network segmentation for security,” in IEEE Symposium on Computational Intelligence for Cyber Security, December 2016.
4.    Muhammad Mostafa Amir Faisal, Muhammad Ariful Islam Chowdhury, ”Bio Inspired Cyber Security Architecture for Smart Grid”, 2016.
5.    Shikha Mehta Parul Agarwal, "Nature-Inspired Algorithms: State-of-Art, Problem and Prospects," International Journal of Computer Applications, vol. 100, no. 14, August 2014.
6.    D. Dasgupta, (2006) “Computational Intelligence in Cyber Security”, IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2006), pp. 2–3.
7.    S. Poonia, A. Bhardwaj, G. S. Dangayach, (2011) “Cyber Crime: Practices and Policies for Its Prevention”, The First International Conference on Interdisciplinary Research and Development, Special No. of the International Journal of the Computer, the Internet and Management, Vol. 19, No.SP1.
8.    Back, T. 1996: Evolutionary algorithms in theory and practice. Oxford University Press.
9.    J.H. Holland, Genetic algorithms and the optimal allocation of trials, SIAM J. Comput. 2 (2) (1973) 88–105
10.    Koza, John R. 1992. Genetic Programming: On  the Programming of Computers by Means of Natural Selection. Cambridge, MA: The MIT Press.
11.    Beyer, H.G. and Schwefel, H.P. 2002: Evolution strategies. Natural Computing 1,3–52.
12.    Mukesh Gupta and Akansha Jain S. N. Tazi, "A Survey on application of nature inspired algorithms," International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), vol. 4, no. 4, pp. 33-40, August 2014.
13.    Bonabeau, E., Dorigo, M. and Theraulaz, G.1999:Swarm intelligence. Oxford University Press
14.    Kennedy, J.; Eberhart, R. (1995). "Particle Swarm Optimization". Proceedings of IEEE International Conference on Neural Networks. IV. pp. 1942– 1948.
15.    Dorigo, M., Maniezzo, V., and Colorni, A. (1996). Ant System: Optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics – Part B, 26, 29–41.
16.    D. Karaboga, B. Basturk, A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm, Journal of Global Optimization 39 (2007) 459–471
17.    X. Li, Z. Shao, J. Qian,Anoptimizing method base on autonomous animates: fish- swarm algorithm, Systems Engineering Theory and Practice 22 (2002) 32–38.
18.    Shah_Hosseini, H. Shahid Beheshti Univ., Tehran Problem solving by intelligent water drops IEEE. Congress on Evolutionary Computation, 2007. CEC 2007.
19.    Binitha S, S Siva Sathya, "A Survey of Bio inspired Optimization Algorithms", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2,  Issue-2, May 2012.
20.    Jianjun Ni, LiuyingWu, Xinnan Fan and Simon X. Yang, "Review Article Bioinspired Intelligent Algorithm and Its Applications for Mobile Robot Control: A Survey" Hindawi Publishing Corporation Computational Intelligence and Neuroscience Volume 2016, Article ID 3810903, 16 pages
21.    Selma Dilek, Hüseyin Çakır and Mustafa Aydın, "Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review", International Journal of Artificial Intelligence and Applications (IJAIA), Vol. 6, No. 1, January 2015.
22.    N. Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, C. Charnsripinyo, (2012) “A Practical Network-based Intrusion Detection and Prevention System”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 209 – 214.
23.    A. S. A. Aziz, M. A. Salama, A. Hassanien, S. E. Hanafi, (2012) “Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm”, Informatica, Vol. 36, pp. 347 358.
24.    F. Barani, (2014) "A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system," Iranian Conference on Intelligent Systems (ICIS), pp.1 6.
25.    P. K. Harmer, P. D. Williams, G. H. Gunsch, G. B. Lamont, (2002) “An Artificial Immune System Architecture for Computer Security Applications”, IEEE transactions on evolutionary computation, Vol. 6, No. 3, pp. 252¬ 280.

Recomonded Articles:

Author(s): Satish Kumar Chandel

DOI: 10.5958/2231-3915.2016.00022.5         Access: Open Access Read More

Author(s): Ruchi Verma, Vinti Nanda

DOI:         Access: Open Access Read More

Author(s): Deepti Verma, Gitanjali Sinha

DOI:         Access: Open Access Read More

Author(s): Preeti Agrawal, Yogesh Rathore

DOI:         Access: Open Access Read More

Author(s): Ajay Kumar Gupta, S. P. Singh

DOI:         Access: Open Access Read More

Author(s): Aamir Hasan, V. K. Patle, Sanjay Kumar

DOI:         Access: Open Access Read More

Author(s): V.R. Prasath Kumar, L. Krishnaraj, Jagadish Raj

DOI: DOI: 10.5958/2231-3915.2015.00005.X         Access: Open Access Read More

Author(s): Prasad KV, Nikhil Bhat S, Vasugi V, Venkatesan R

DOI: 10.5958/2231-3915.2015.00034.6         Access: Open Access Read More

Author(s): Satish Kumar, V.K. Bansal

DOI:         Access: Open Access Read More

Author(s): Jonardan Koner, Avinash Purandare

DOI: 10.5958/2231-3915.2015.00033.4         Access: Open Access Read More

Author(s): Srinivas Angadi, M Padmavathi, Raja Sekhar Mamillapalli

DOI: 10.5958/2231-3915.2015.00035.8         Access: Open Access Read More

Author(s): Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav

DOI: 10.5958/2231-3915.2020.00016.4         Access: Closed Access Read More

Author(s): Neeraj Kumar Nage, Devendra Chaphekar

DOI: 10.5958/2231-3915.2020.00014.0         Access: Closed Access Read More

Author(s): Digeshwar Prasad Sahu, Yamini Sahu, Swati Jain

DOI: 10.5958/2231-3915.2020.00020.6         Access: Closed Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags