Skip to main content

Abstract

In a world that is heavily relying on connected computers for the efficient execution of most daily tasks, Computer Security is absolutely critical. Therefore, in order to perform a complete analysis, new models and paradigms are needed to better manage the complexity of systems for an automated and data-driven economy. In past work we have described a bio-inspired approach that leverages metabolic networks to enhance and facilitate the use of attack-graph analysis to evaluate the security of systems, namely the BIAM framework. In this paper we describe the application of the BIAM framework to the search, analysis and assessment of the vulnerabilities of a simulated real-world use-case in the field of home-automation and ambient-intelligence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alhomidi, M.A., Reed, M.J.: Attack graphs representations. In: 4th Computer Science and Electronic Engineering Conference (2012)

    Google Scholar 

  2. Vitabile, S., Conti, V., Lanza, B., Cusumano, D., Sorbello, F.: Metabolic Networks Robustness: theory, simulations and results. J. Interconnect. Netw. 12(3), 221–240 (2011)

    Article  Google Scholar 

  3. Conti, V., Ruffo, S.S., Vitabile, S., Barolli, L.: BIAM: a new bio-inspired analysis methodology for digital ecosystems based on a scale-free architecture. Soft. Comput. 23(4), 1133–1150 (2019)

    Article  Google Scholar 

  4. Conti, V., Ziggiotto, A., Migliardi, M., Vitabile, S.: Bio-inspired security analysis for IoT scenarios. Int. J. Embedded Syst. 13(2), 221–235 (2020)

    Article  Google Scholar 

  5. Conti, V., Militello, C., Rundo, L., Vitabile, S.: A novel bio-inspired approach for high-performance management in service-oriented networks. IEEE Trans. Emerg. Top. Comput. 9(4), 1709–1722 (2021)

    Article  Google Scholar 

  6. Vitello, G., Alongi, A., Conti, V., Vitabile, S.: A bio-inspired cognitive agent for autonomous urban vehicles routing optimization. IEEE Trans. Cogn. Dev. Syst. 9(1), 5–15 (2017)

    Article  Google Scholar 

  7. Ko, H., Ramos, C.: A survey of context classfication for intelligent systems research for ambient intelligence. Int. Conf. Complex, Intell. Softw. Intensive Syst. (2010)

    Google Scholar 

  8. Phillips, C., Swiler, L.P.: A graph-based system for network vulnerability analysis. In: Proceedings of New Security Paradigms, pp. 71–79 (1998)

    Google Scholar 

  9. Chokshi, I., Das, S., Ghosh, N., Ghosh, S., Kaushik, A., Sarkar, M.: NetSecuritas: an integrated attack graph-based security assessment tool for enterprise network. In: Proceedings of the International Conference on Distributed Computing and Networking (2015)

    Google Scholar 

  10. Ammann, P., Pamula, J., Ritchey, R., Street, J.: A host-based approach to network attack chaining analysis. In: 21st Annual Computer Security Applications Conference, pp. 10–84 (2005)

    Google Scholar 

  11. Zhang, T., Ming-Zeng, H., Li, D., Sun, L.: An effective method to generate attack graph. Int. Conf. Mach. Learn. Cybern. 7, 3926–3931 (2005)

    Google Scholar 

  12. Xiao, X., Zhang, T., Wang, H., Zhang, G.: A component-centric access graph based approach to network attack analysis. In: International Seminar on Future Information Technology and Management Engineering, pp. 171–176 (2008)

    Google Scholar 

  13. Liu, Z., Li, S., He, J., Xie, D., Deng, Z.: Complex network security analysis based on attack graph model. In: Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 183–186 (2012)

    Google Scholar 

  14. Chao, Z., Huiqiang, W., Fangfang, G., Mo, Z., Yushu, Z.: A heuristic method of attack graph analysis for network security hardening. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 43-47 (2014)

    Google Scholar 

  15. Gallon, L., Bascou, J.: CVSS attack graphs. In: Seventh International Conference on Signal Image Technology and Internet-Based Systems, pp. 24–31 (2011ğ)

    Google Scholar 

  16. Malzahn, D., Birnbaum, Z., Wright-Hamor, C.: Automated vulnerability testing via executable attack graphs. In: International Conference on Cyber Security and Protection of Digital Services, pp. 1–10 (2020)

    Google Scholar 

  17. Musa, T., et al.: Analysis of complex networks for security issues using attack graph. In: International Conference on Computer Communication and Informatics, pp. 1–6 (2019)

    Google Scholar 

  18. Guimerá, R., Amaral, L.A.N.: Functional cartography of complex metabolic network. Nature 433, 895–900 (2005)

    Article  Google Scholar 

  19. Schilling, C.H., Letscher, D., Palsson, B.: Theory for the systemic definition of metabolic pathways and their use in interpreting metabolic function from a pathway-oriented perspective. J. Theor. Biol. 248, 203–229 (2000)

    Google Scholar 

  20. Wiback, J.S., Palsson, B.O.: Extreme pathway analysis of human red blood cell metabolism. Biophys. J . 83, 808–818 (2003)

    Article  Google Scholar 

  21. Barbehenn, M.: A note on the complexity of Dijkstra’s algorithm for graphs with weighted vertices. IEEE Trans. Comput. 47(2), 263 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  22. Provost, A., Bastin, G.: Metabolic flux analysis: an approach for solving non-stationary undetermined systems. In: Troch, I., Breitenecker, F., Editors, 5th MATHMOD, pp. 5–10 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vincenzo Conti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Conti, V., Gallo, A., Migliardi, M., Vitabile, S. (2023). Bio-Inspired Security Analysis: A Domotic Use-Case. In: Bravo, J., Urzáiz, G. (eds) Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023). UCAmI 2023. Lecture Notes in Networks and Systems, vol 841. Springer, Cham. https://doi.org/10.1007/978-3-031-48590-9_18

Download citation

Publish with us

Policies and ethics