Abstract
While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium, Security 2002 (2002)
Linke, S., Norris, R.H., Faith, D.P., Stockwell, D.: ANNA: A new prediction method for bioassessment programs. Freshw. Biol. (in press)
Linke, S., Norris, R., Faith, D.P.: Australian River Assessment System: Improving AusRivAS Analytical Methods DDRAM and E-Ball (Phase I Final Report). Commonwealth of Australia, Canberra and University of Canberra, Canberra (2002)
Stockwell, D.R.B., Noble, I.R.: Induction Of Sets Of Rules From Animal Distribution Data - A Robust And Informative Method Of Data-Analysis. Mathematics And Computers In Simulation 33, 385–390 (1992)
Peterson, A.T.: Predicting the geography of species’ invasions via ecological niche modeling. Q Rev. Biol. 78, 419–433 (2003)
Erasmus, B., Van Jaarsveld, A., Chown, S., Kshatriya, M., Wessels, K.: Vulnerability of South African animal taxa to climate change. Glob. Ch. Biol. 8, 679–693 (2002)
Peterson, A.T., Vieglais, D.A., Andreasen, J.K.: Migratory birds modeled as critical transport agents for West Nile Virus in North America. Vector Borne Zoonotic Dis. 3, 27–37 (2003)
Costa, J., Peterson, A.T., Beard, C.B.: Ecologic niche modeling and differentiation of populations of Triatoma brasiliensis neiva, 1911, the most important Chagas’ disease vector in northeastern Brazil (hemiptera, reduviidae, triatominae). Am. J. Trop. Med. Hyg. 67, 516–520 (2002)
Peterson, A.T., Bauer, J.T., Mills, J.N.: Ecologic and geographic distribution of filovirus disease. Emerg. Infect. Dis. 10, 40–47 (2004)
Levine, R.S., Peterson, A.T., Benedict, M.Q.: Distribution of members of Anopheles quadrimaculatus say s.l (Diptera: Culicidae) and implications for their roles in malaria transmission in the United States. J. Med. Entomol. 41, 607–613 (2004)
Levine, R.S., Peterson, A.T., Benedict, M.Q.: Geographic and ecologic distributions of the Anopheles gambiae complex predicted using a genetic algorithm. Am. J. Trop. Med. Hyg. 70, 105–109 (2004)
Beard, C., Pye, G., Steurer, F., Rodriguez, R., Campman, R., Peterson, A., Ramsey, J., Wirtz, R., Robinson, L.: Chagas disease in a domestic transmission cycle in southern Texas, USA. Emerg. Infect. Dis. 9, 103–105 (2003)
Shasha, D., Wang, J.T.L., Zhang, S.: Unordered Tree Mining with Applications to Phylogeny. In: Proceedings of the 20th International Conference on Data Engineering, Boston, Massachusetts (2004)
Shasha, D., Wang, J.T.L., Shan, H., Zhang, K.: ATreeGrep: Approximate Searching in Unordered Trees. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, Edinburgh, Scotland (2002)
Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding Approximate Patterns in Undirected Acyclic Graphs. Pattern Recogn. 35, 473–483 (2002)
Shasha, D., Wang, J.T.L., Giugno, R.: Algorithmics and Applications of Tree and Graph Searching. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Madison, Wisconsin (2002)
Vatis, M.: Cyber Attacks During the War on Terrorism: A Predictive Analysis. Dartmouth College (2001)
Caswell, B., Roesch, M.: SNORT Intrusion Detection System (2004)
CAIDA: Center for Internet Security (2003)
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P.: The MINDS - Minnesota Intrusion Detection System: Next Generation Data Mining. MIT Press, Cambridge (2004)
Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of Third SIAM Conference on Data Mining, San Francisco (2003)
Clarke, R., Furse, M., Wright, J., Moss, D.: Derivation of a biological quality index for river sites: Comparison of the observed with the expected fauna. J. Appl. Stats. 23, 311–332 (1996)
Clarke, R., Wright, J., Furse, M.: RIVPACS models for predicting the expected macroinvertebrate fauna and assessing the ecological quality of rivers. Ecol. Model. 160, 219–233 (2003)
Faith, D., Dostine, P., Humphrey, C.: Detection of moning impacts of aquatic macroinvertebrate communities - results of a disturbance experiment and the design of a multivariate BACIP monitoring program at Coronation Hill, Northern Territory. Aust. J. Ecol. 20, 167–180 (1995)
Humphrey, C., Faith, D., Dostine, P.: Base-line rquirements for assessment of moining impact using biological monitoring. Aust. J. Ecol. 20, 150–166 (1995)
Stockwell, D.R.B., Faith, D.P.: Investigation of alternative approaches to linking habitat variables with site classification in a RIVPACS model - Final Report (1996)
Eubank, S., Kumar, V.S.A., Marathe, M.V., Srinivasan, A., Wang, N.: Structural and algorithmic aspects of massive social networks. In: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, New Orleans, Louisiana (2004)
Moret, B.M.E., Nakhleh, L., Warnow, T., Linder, C.R., Tholse, A., Padolina, A., Sun, J., Timme, R.: Phylogenetic networks: modeling, reconstructibility, and accuracy. IEEE/ACM Transactions on Computational Biology and Bioinformatics 1, 13–23 (2004)
Wang, J.T.L., Shapiro, B.A., Shasha, D., Zhang, K., Currey, K.M.: An Algorithm for Finding the Largest Approximately Common Substructures of Two Trees. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 889–895 (1998)
Wang, J.T.L., Zhang, K.: Information Sciences 126, 165–189 (2000)
Wang, J.T.L., Zhang, K.: Finding Similar Consensus between Trees: An Algorithm and a Distance Hierarchy. Pattern Recogn. 34, 127–137 (2001)
Wang, J.T.L., Zhang, K., Chirn, G.-W.: Algorithms for Approximate Graph Matching. Information Sciences 82, 45–74 (1995)
Zhang, K., Wang, J.T.L., Shasha, D.: On the Editing Distance between Undirected Acyclic Graphs. International Journal of Foundations of Computer Science 7, 43–57 (1996)
Cook, D.J., Holder, L.B.: Graph-Based Data Mining. IEEE Intelligent Systems 15, 32–41 (2000)
Wang, J.T.L., Zaki, M.J., Toivonen, H.T.T., Shasha, D.: Data Mining in Bioinformatics. Springer, London (2004)
Whitney, A.: K programming language (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stockwell, D.R.B., Wang, J.T.L. (2005). Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_53
Download citation
DOI: https://doi.org/10.1007/11427995_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)