Show simple item record

dc.contributor.authorPourmoafi, Seyedali
dc.date.accessioned2024-09-18T10:48:18Z
dc.date.available2024-09-18T10:48:18Z
dc.date.issued2024-07-17
dc.identifier.urihttp://hdl.handle.net/2299/28186
dc.description.abstractCyber-attacks have become increasingly frequent and severe in recent years, posing a significant threat to both economic and safety domains. In order to mitigate these threats, it is crucial to have a thorough understanding of the various types of attacks, including their behaviour and properties. Bio-cyber operation is a new field of research that draws inspiration from the human immune system, which has found solutions to problems that cybersecurity professionals have been struggling with for decades. By studying the human immune system, cybersecurity can teach valuable lessons on how to detect and deter attacks. To address the issue of sensitive information or data leakage, a "cyber immune" technology can be employed to detect unknown cyber-attacks and provide a powerful defence mechanism. This thesis proposes a methodology for predicting potential vulnerabilities by utilizing natural language processing (NLP) and analysing "Common Vulnerabilities and Exposure" (CVE) reports. Additionally, the implementation of Gradient Sensitivity (GS) and Gradient Sensitivity Input (GI) techniques into our framework represents a significant leap forward in enhancing the model's explainability. The incorporation of GS and GI techniques into our framework means that our models meet the critical needs of cybersecurity applications today. They strike a balance between advanced predictive capabilities and the equally important need for transparency and interpretability. This balance is what will keep driving cybersecurity efforts forward, ensuring that we're not just creating models that can predict threats but also fostering a cybersecurity approach that can effectively act on these predictions. Finaly, by examining the field of human biology, we can gain significant insight into the bio-cybersecurity domain, which can be applied to developing more effective cybersecurity measures. Our results indicate that by using NLP we can achieve high percentage of accuracy to predict the possible vulnerability (more than 94%) as well as find the interrelationship between different vulnerabilities (more than 53% similarity).en_US
dc.language.isoenen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/us/*
dc.subjectInformation securityen_US
dc.subjectBio cyber securityen_US
dc.subjectNLPen_US
dc.subjectattack treeen_US
dc.subjectvulnerability treeen_US
dc.subjectvulnerability interrelationshipen_US
dc.titleA Solution for Securing the Information Environment Inspired by Living Organisms and Biologyen_US
dc.typeinfo:eu-repo/semantics/articleen_US
dc.type.qualificationlevelDoctoralen_US
dc.type.qualificationnamePhDen_US
dcterms.dateAccepted2024-07-17
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US
rioxxterms.versionNAen_US
rioxxterms.licenseref.urihttps://creativecommons.org/licenses/by/4.0/en_US
rioxxterms.licenseref.startdate2024-09-18
herts.preservation.rarelyaccessedtrue
rioxxterms.funder.projectba3b3abd-b137-4d1d-949a-23012ce7d7b9en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

info:eu-repo/semantics/openAccess
Except where otherwise noted, this item's license is described as info:eu-repo/semantics/openAccess