Bio-inspired Computing Techniques for Data Security Challenges and Controls

被引:0
作者
Sripriyanka G. [1 ]
Mahendran A. [1 ]
机构
[1] School of Computer Science and Engineering, Vellore Institute of Technology, Tamil Nadu, Vellore
关键词
Attacks; Bio-inspired computing; Connectivity; Controls; Data security; Optimization; Security challenges;
D O I
10.1007/s42979-022-01292-w
中图分类号
学科分类号
摘要
Bio-inspired computing approach is based on the nature and biology for solving complex real-world challenges with enhanced solutions. In this modern era smart technology, connectivity and information play a vital role in the enhancement of human daily life. In the insolent connected world, an eruption of data is increasing and it became exceedingly vulnerable to the threat surface while transfer, collection, and storage of real-time information. Through an international network, this collected information is stored in the public environment. Invaders switch and open the users’ trustworthy material without authorized access for malicious activity. And the hackers are substituting the unique information with the forged records. The collected information is exposed to the assaults, such as malware, phishing, flooding, replay, password attacks, and so on. With this new expertise, various mathematical and optimized computational methods are developed for data safety through biology and nature. Guaranteeing and comforting the security of information necessitate stimulation from the natural sphere. With this advancement, nature has developed biology and nature-based inspired techniques for resolving data security in real time through variation. For data security challenges, these techniques have various graceful solutions with high accurateness and efficacy. In this paper, we review the generous trends in bio-inspired computing methodologies for solving information security issues with extraordinary elucidations. In the future, to design a hybrid bio-inspired security model to enhance data safeguarding on various smart world applications. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 75 条
[1]  
Ahsan M.M., Gupta K.D., Nag A.K., Poudyal S., Kouzani A.Z., Mahmud M.P., Applications and evaluations of bio-inspired approaches in cloud security: a review, IEEE Access, 8, pp. 180799-180814, (2020)
[2]  
Johnson A.P., Al-Aqrabi H., Hill R., Bio-inspired approaches to safety and security in iot-enabled cyber-physical systems, Sensors, 20, 3, (2020)
[3]  
Fan X., Sayers W., Zhang S., Han Z., Ren L., Chizari H., Review and classification of bio-inspired algorithms and their applications, J Bionic Eng, 17, 3, pp. 611-631, (2020)
[4]  
Rauf U., A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions, Arab J Sci Eng, 43, 12, pp. 6693-6708, (2018)
[5]  
Saleem K., Alabduljabbar G.M., Alrowais N., Al-Muhtadi J., Imran M., Rodrigues J.J., Bio-inspired network security for 5G-enabled IoT applications, IEEE Access, 8, pp. 229152-229160, (2020)
[6]  
Namasudra S., Devi D., Kadry S., Sundarasekar R., Shanthini A., Towards DNA based data security in the cloud computing environment, Comput Commun, 151, pp. 539-547, (2020)
[7]  
Forestiero A., Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system, Knowl-Based Syst, 228, (2021)
[8]  
Thabit F., Alhomdy S., Jagtap S., A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions, Int J Intell Netw, 2, pp. 18-33, (2021)
[9]  
Murali R., Velayutham C.S., A conceptual direction on automatically evolving computer malware using genetic and evolutionary algorithms, 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 226-229, (2020)
[10]  
Alzaqebah A., Aljarah I., Al-Kadi O., Damasevicius R., A modified Grey Wolf Optimization algorithm for an intrusion detection system, Mathematics, 10, 6, (2022)