Modelling Artificial Immunization Processes to Counter Cyberthreats

This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer attacks. The main conclusions and recommendations are that using an immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks. The immunization approach enables a symmetrical response to an intruder in a protected system to be produced rapidly. This symmetry provides a step-by-step neutralization of all stages of a cyber attack, which, combined with the accumulation of knowledge of the attacker’s actions, allows a base of defensive responses to be generated for various cyber attack scenarios. The theoretical conclusions are supported by practical experiments describing real-world scenarios for the use of immunization tools to protect against cyber threats.

[1]  Lu-Xing Yang,et al.  The impact of nonlinear infection rate on the spread of computer virus , 2015 .

[2]  Chenquan Gan,et al.  A propagation model of computer virus with nonlinear vaccination probability , 2014, Commun. Nonlinear Sci. Numer. Simul..

[3]  Rafał Renk,et al.  Cyber Threats Impacting Critical Infrastructures , 2016 .

[4]  Daria S. Lavrova,et al.  Cyber Attack Prevention Based on Evolutionary Cybernetics Approach , 2020, Symmetry.

[5]  Ranjit Kumar Upadhyay,et al.  Modeling and control of computer virus attack on a targeted network , 2020 .

[6]  P. K. Anokhin,et al.  Systemogenesis as a General Regulator of Brain Development , 1964 .

[7]  Bimal Kumar Mishra,et al.  Effect of anti-virus software on infectious nodes in computer network: A mathematical model , 2012 .

[8]  Isabel Praça,et al.  Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities , 2021, Artificial Intelligence Review.

[9]  Shlomo Havlin,et al.  Efficient network immunization under limited knowledge , 2021, National science review.

[10]  Salma M. Al-Tuwairqi,et al.  Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity , 2021 .

[11]  Ranjit Kumar Upadhyay,et al.  Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate , 2017 .

[12]  Ángel Martín del Rey,et al.  Mathematical modeling of the propagation of malware: a review , 2015, Secur. Commun. Networks.