Skip to main content

Neuromorphic Computing for Cognitive Augmentation in Cyber Defense

  • Chapter
  • First Online:
Book cover Cybersecurity Systems for Human Cognition Augmentation

Part of the book series: Advances in Information Security ((ADIS,volume 61))

Abstract

The growth of digital content and information through the World Wide Web is increasing rapidly and more of this traffic is generated by smart mobile low size, weight, and power (SWaP) devices that are constantly sending/receiving information to/from the network for up-to-date operation. In terms of data, according to an IDC report by Gantz and Reinsel in 2012 [1], from 2005 to 2020, the digital universe will grow by a factor of 300, from 130 to 40,000 exabytes, and from now until 2020, the digital universe will about double every 2 years. The size of the digital universe in 2010 was estimated at 1,227 exabytes [1] in particular. Therefore, it can be expected that an increasing number of low SWaP devices will be implemented to offer enhanced functionality in terms of the complexity and number of services offered to users within the physically and electronically constrained form factor architecture. From a network security stand point, it will be important for the Army to ensure security and trust in the operation and functionality of smart mobile tactical devices. However, from the user’s point of view, performance degradation due to security add-ons may degrade device performance during operation and during operations where speed is critical, enhanced security could degrade operational effectiveness. Therefore, it is the main goal of this effort to perform basic research in methods and techniques to provide security to mobile tactical networks while ensuring low SWaP technical requirements for operation. In this pursuit, we have considered two basic research areas that could provide a revolutionary solution to the problem. The first technology area is memristor-based computing and the second area is artificial neural networks. It is expected that memristor-based physical computing architectures will deliver ultra-low SWaP and neural networks will enable parallelism and reconfiguration benefits. This chapter will provide a brief overview of the memristor technology and its applications within neural networks and their potential application to enabling human cognition augmentation in the Cyber-domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. John Gantz and David Reinsel, “THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East”, IDC IVIEW Report, http://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf, Sponsored by EMC. Dec. 2012.

  2. L.O. Chua, “Memristor - the missing circuit element,” IEEE Trans. Circuit Theory, 18 (1971) 507–519.

    Google Scholar 

  3. Dmitri B. Strukov, Gregory S. Snider, Duncan R. Stewart, and R. Stanley Williams, “The missing memristor found,” Nature 453 (2008), 80–83.

    Google Scholar 

  4. R. Williams, “How We Found The Missing Memristor,” IEEE Spectrum, 45 (2008) 28-35. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4687366&isnumber=4467055

  5. R.E Pino, J.W. Bohl, N. McDonald, B. Wysocki, P. Rozwood, K. Campbell, A Timilsina, “Compact method for modeling and simulation of memristor devices: Ion conductor chalcogenide-based memristor devices,” 2010 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH), Anaheim, CA, June 17-18 (2010) pp 1-4. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5510936&isnumber=5510921

  6. Chris Yakopcic, Tarek M. Taha, Guru Subramanyam, and Robinson E. Pino, “Memristor SPICE Model and Crossbar Simulation Based on Devices with Nanosecond Switching Time,” Proceedings of International Joint Conference on Neural Networks, Dallas, Texas, USA, August 4-9, 2013, pp.

    Google Scholar 

  7. C. Yakopcic, T.M. Taha, G. Subramanyam, R.E. Pino, S. Rogers, “A Memristor Device Model,” IEEE Electron Device Letters, 32 (2011) 1436-1438.

    Google Scholar 

  8. Robert Kozma, Robinson E. Pino, and Giovanni E. Pazienza, “Are Memristors the Future of AI?,” R. Kozma et al. (eds.), Advances in Neuromorphic Memristor Science and Applications, Springer, New York, 2012, pp 9-14.

    Google Scholar 

  9. Qiangfei Xia, Warren Robinett, Michael W. Cumbie, Neel Banerjee, Thomas J. Cardinali, J. Joshua Yang, Wei Wu, Xuema Li, William M. Tong, Dmitri B. Strukov, Gregory S. Snider, Gilberto Medeiros-Ribeiro, and R. Stanley Williams, “Memristor−CMOS Hybrid Integrated Circuits for Reconfigurable Logic,” Nano Letters 9 (2009) 3640-3645.

    Google Scholar 

  10. M. Shevenell, “Task 2 - Research Emerging Technologies for Embedded High Performance Intelligent Sensor,” ARL internal presentation, Security for Tactical Operations Relying on Methods for Enhancing Robustness (STORMER), 1st Quarter Review 2013 STORMER Team,

    Google Scholar 

  11. Joshua S. White, Thomas Fitsimmons, Jeanna N. Matthews, “Quantitative Analysis of Intrusion Detection Systems Snort and Suricata,” SPIE Defence and Security, Sensing, Cyber Sensing 2013, Proc. of SPIE 8757 (2013) pp. 875704-1-12.

    Google Scholar 

  12. PowerEdge R717 Techical Guide, http://www.dell.com/downloads/global/products/pedge/en/Poweredge-r715-technicalguide.pdf (Viewed on September 12, 2013).

  13. FAQs, Raspberry Pi, <http://www.raspberrypi.org/faqs>, (9 September 2013)

  14. R. Pino, “Reconfigurable Electronic Circuit,” United States Patent 7902857, March 8 (2011).

    Google Scholar 

  15. R. Pino, “Neuromorphic Computer,” United States Patent 8275728, September 25 (2012).

    Google Scholar 

  16. R. Pino, J. Bohl, “Self-Reconfigurable Memristor-Based Analog Resonant Computer,” United States Patent 8274312, September 25 (2012).

    Google Scholar 

  17. Robinson E. Pino, Youngok K. Pino, “Reconfigurable memristor-based computing logic,” United States Patent US 8427203 B2, April 23 (2013).

    Google Scholar 

  18. G.S. Rose, R. Pino, Q. Wu, “A low-power memristive neuromorphic circuit utilizing a global/local training mechanism,” Proceedings of International Joint Conference on Neural Networks (IJCNN), San Jose, CA, July 31-5, 2011, pp. 2080 – 2086.

    Google Scholar 

  19. David Bol, Dina Kamel, Denis Flandre, Jean-Didier Legat, “Nanometer MOSFET effects on the minimum-energy point of 45nm subthreshold logic,” Proceedings of the 14th ACM/IEEE international symposium on Low power electronics and design (ISLPED), San Fancisco, CA, August 19–21, 2009, pp. 3-8.

    Google Scholar 

  20. R. Pino, H. Li, Y. Chen, M. Hu. B. Liu, “Statistical memristor modeling and case study in neuromorphic computing,” 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, June 3-7, 585 - 590 (2012).

    Google Scholar 

  21. McCulloch and Pitts, “A logical calculus of the ideas immanent in nervous activity,” Bulletin of Mathematical Biophysics, 5 (1943) 115-133.

    Google Scholar 

  22. O. L. Mangasarian, “Linear and Nonlinear Separation of Patterns by Linear Programming,” Operations Research, 13 (1965) 444-452.

    Google Scholar 

  23. Paul J. Werbos, “Beyond Regression: New Tools for Prediction and Analysis in the Behavioral Sciences,” PhD thesis, Harvard University (1974).

    Google Scholar 

  24. Paul J. Werbos, “Backpropagation through time: what it does and how to do it,” Proceedings of the IEEE, 78 (1990) 1550 – 1560.

    Google Scholar 

  25. S. Pervez, I. Ahmad, A. Akram, S. U. Swati, “A Comparative Analysis of Artificial Neural Network Technologies in Intrusion Detections Systems,” Proc. of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies, Lisbon, Portugal, September 22-24 (2006).

    Google Scholar 

  26. J.P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical Report, J.P. Anderson Company, Fort Washington, Pennsylvania April (1980).

    Google Scholar 

  27. D. Denning, “An Intrusion-Detection Model,” IEEE Tran Software Engineering, SE-13(2) 222-232 (1987).

    Google Scholar 

  28. J. Cannady, “Artificial Neural Networks for Misuse Detection,” Proc. 21st National Information Systems Security Conference, Arlington, VA, October 5-8 (1998).

    Google Scholar 

  29. T. Vollmer, M. Manic, “Computationally Efficient Neural Network Intrusion Security Awareness,” Proc. 2nd International Symposium on Resilient Control Systems, Idaho Falls, ID, August 11 - 13 (2009).

    Google Scholar 

  30. H.G. Kayacik, A.N. Zincir-Heywood, M.I. Heywood, “On the capability of an SOM based intrusion detection system,” 2003 IEEE Proceedings of the International Joint Conference on Neural Networks (IJCNN 2003) July 20-24, 2003, pp.1808,1813

    Google Scholar 

  31. KDD Cup 1999 Data, The UCI KDD Archive Information and Computer Science University of California, <http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html> (9 September 2013).

  32. Domain Names - Implementation And Specification, http://www.ietf.org/rfc/rfc1035.txt, (viewed on September 11, 2013)

  33. tcpdump, http://www.tcpdump.org/ (viewed on July 23, 2013).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robinson E. Pino .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Pino, R.E., Kott, A. (2014). Neuromorphic Computing for Cognitive Augmentation in Cyber Defense. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10374-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10373-0

  • Online ISBN: 978-3-319-10374-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics