Self-Organising Maps in Computer Security

08/05/2016
by   Jan Feyereisl, et al.
0

Some argue that biologically inspired algorithms are the future of solving difficult problems in computer science. Others strongly believe that the future lies in the exploration of mathematical foundations of problems at hand. The field of computer security tends to accept the latter view as a more appropriate approach due to its more workable validation and verification possibilities. The lack of rigorous scientific practices prevalent in biologically inspired security research does not aid in presenting bio-inspired security approaches as a viable way of dealing with complex security problems. This chapter introduces a biologically inspired algorithm, called the Self Organising Map (SOM), that was developed by Teuvo Kohonen in 1981. Since the algorithm's inception it has been scrutinised by the scientific community and analysed in more than 4000 research papers, many of which dealt with various computer security issues, from anomaly detection, analysis of executables all the way to wireless network monitoring. In this chapter a review of security related SOM research undertaken in the past is presented and analysed. The algorithm's biological analogies are detailed and the author's view on the future possibilities of this successful bio-inspired approach are given. The SOM algorithm's close relation to a number of vital functions of the human brain and the emergence of multi-core computer architectures are the two main reasons behind our assumption that the future of the SOM algorithm and its variations is promising, notably in the field of computer security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/30/2013

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

The use of artificial immune systems in intrusion detection is an appeal...
research
10/16/2009

An Immune Inspired Approach to Anomaly Detection

The immune system provides a rich metaphor for computer security: anomal...
research
03/08/2010

Information Fusion in the Immune System

Biologically-inspired methods such as evolutionary algorithms and neural...
research
01/13/2010

Cooperative Automated Worm Response and Detection Immune Algorithm

The role of T-cells within the immune system is to confirm and assess an...
research
12/12/2019

Using Deep Learning to Solve Computer Security Challenges: A Survey

Although using machine learning techniques to solve computer security ch...
research
02/24/2022

Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health

Background- This paper summarizes the state-of-the-art and applications ...
research
12/14/2021

A study on the Morris Worm

The Morris worm was one of the first worms spread via the internet. It w...

Please sign up or login with your details

Forgot password? Click here to reset