Abstract
While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.
Original language | English (US) |
---|---|
Pages (from-to) | 523-529 |
Number of pages | 7 |
Journal | Lecture Notes in Computer Science |
Volume | 3495 |
DOIs | |
State | Published - 2005 |
Externally published | Yes |
Event | IEEE International Conference on Intelligence and Security Informatics, ISI 2005 - Atlanta, GA, United States Duration: May 19 2005 → May 20 2005 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- General Computer Science