Artificial Immune System Based Approach to Cyber Attack Detection
Professor Tarek Saadawi
City University of New York
Cyber Attacks have been increaing at an alraming rate. For example, the attack on DYN compnay on
October, 2016 have resulted in the cutoff of Internet services in the North East of the USA. The Dyn
company is an organization that controls many of the Domain Name Servers that service American
domains. This widely successful attack utilized the now infamous Mirai – a nasty piece of malware that
powers an extensive botnet largely populated by Internet of Things (IoT) devices. Advancements in
Internet of Things (IoT), nanotech computing, wireless, advanced robotics, autonomous systems,
intelligent agents, cloud computing and other technologies, as well as reliance on 3rd party commercial-
off-the- shelf software, will also increase the cyber-attack surface in systems and networks.
Given the ability of the human immune system to detect all forms of infections and how the human body
can be related to the complex network of interconnected systems that exist today, our proposal takes a
biological approach to solving the network intrusion detection problem. Our proposed bio-inspired system
for network intrusion detection makes use of the models that exist in immunology which has been
abstracted to an area under artificial intelligence known as artificial immune system (AIS). The proposed
system will be a combination of the immunology-developed theory of self-nonself (SNS), and danger
theory (DT). The proposed system stems from our successful application of SNS and DT respectively to
the detection of cyber attacks that originate from external networks. Our proposed system will be
detecting cyber-attacks that originate from both inside and outside a communication network.
Brief Biography of the Speaker:
Dr. Tarek Saadawi is the Director of the Center for Information Networking and Telecommunications (CINT) and a professor at the City College of New York (CCNY). Dr. Saadawi has published extensively in the area of information networks and network security. He is a co-editor of the book “Cyber Infrastructure Protection” Strategic Study Institute, volume 1, May 2011, Volume 2 May 2013, and volume 3 (expected 2016), and the lead author of the book, Fundamentals of Telecommunication Networks,” John Wiley & Sons, 1994. The latter is considered a seminal work in the field and translated into Chinese. His most recent work has focused on network security, the vulnerability of wireless networks, denial of service attacks, mitigation strategy, resilient routing protocols for ad-hoc wireless network, connected vehicles security, and smart grid vulnerability analysis and its intrusion detection schemes..