Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Lessons Learned from Robotics Applied to Cyber Security

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 8
Year of Publication: 2013
Authors:
Teresa Escrig
Sam Chung
10.5120/12904-9795

Teresa Escrig and Sam Chung. Article: Lessons Learned from Robotics Applied to Cyber Security. International Journal of Computer Applications 74(8):12-18, July 2013. Full text available. BibTeX

@article{key:article,
	author = {Teresa Escrig and Sam Chung},
	title = {Article: Lessons Learned from Robotics Applied to Cyber Security},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {8},
	pages = {12-18},
	month = {July},
	note = {Full text available}
}

Abstract

An extensive research and development activity of almost twenty years in two fields of Artificial Intelligence - Robotics and Cognitive Vision, can bring new perspectives to Cyber Security field. At the beginning, there was a knowledge gap between the different fields that we needed to bridge. This paper is about the lessons learnt from Robotics that can be transferred into Cyber Security as wisdom to provide the basis for a holistic strategy to mitigate the severe and increasing Cyber Security problems.

References

  • Martin Hilbert and Priscila López, The World's Technological Capacity to Store, Communicate, and Compute Information, Science, 11 February 2011, pp. 692-693.
  • National Security Council, Cybersecurity, www. whitehouse. gov/administration/eop/nsc/cybersecurity, accessed on June 6, 2013.
  • L. Hively, F. Sheldo, A. Cinzia-Squicciarini, "Toward Scalable Trustworthy Computing Using the Human- Physiology-Immunity Metaphor", IEEE Security & Privacy, Vol. 9, Issue 4, July-Aug 2011, pp. 14-23.
  • F. T. Sheldon and C. A. Vishik, "Moving toward Trustworthy Systems: R&D Essentials," IEEE Computer, vol. 43, no. 9, September 2010, pp. 31–40.
  • K. R. Karthikeyan and A. Indra, "Intrusion Detection Tools and Techniques – A Survey," International Journal of Computer Theory and Engineering, Vol. 2, No. 6, December, 2010, pp. 901-906.
  • B. Morel, "Artificial Intelligence a Key to the Future of CyberSecurity", 4th ACM workshop on Artificial Intelligence and Security (AISEC2011), October 21, 2011, Chicago, IL, USA, pp. 93-97.
  • M. Pradhan, S. K. Pradhan, and S. K. Sahu, "A Survey on Detection Methods in Intrusion Detection Systems," International Journal of Computer Application, Issue 2, Volume 3, June 2012. pp. 81-90.
  • Javitz, H. , Valdes, A. , "The NIDES Statistical Component Description and Justification", SRI International Annual Report, March 7, 1994.
  • Bace, R. "Intrusion Detection," ISBN 1-57870-185-6, 2001.
  • Axelsson, S. , "Research in Intrusion-Detection Systems: A Survey," TR 98-17. Goteborg, Sweden: Department of Computer Engineering, Chalmers University of Technology, 1999. http://www. cs. unc. edu/~jeffay/courses/nidsS05/surveys/Axelson99-ids-survey. pdf
  • Fox, K. L. , Henning, R. R. , Reed, J. H. , Simonian, R. P. , "A Neural Network Approach Towards Intrusion Detection," in NIST (Ed. ) Proceedings of the 13th National Computer Security Conference, October, 1990.
  • Lindqvist, U. , Porras, P. A. , "Detecting computing and networking misuse through the production-based expert system toolset (P-BEST)," in L. Gong & M. Reiter (eds. ) Proceeding of the IEEE symposium on security and privacy, IEEE Computer Society, pp. 146-161, Los Alamitos, CA, 1999.
  • Kumar, S, Spafford, E. H. , "A pattern-matching model for misuse intrusion detection," In NIST (Ed. ), Proceeding of the 17th National Computer Security Conference, National Institute of Standards and Technology (NIST), pp. 11-21, Baltimore, 1994.
  • Ludovic, M. , "ASSATA: A Genetic algorithm as an Alternative Tool for Security Audit Trails Analysis," RAID, 1998.
  • Stiawan, D. et al. "Intrusion Prevention System: a Survey," Journal of Theoretical and Applied Information Technology, Vol. 40, No. 1. June 2012. pp. 44-54
  • Hernández, D. , Qualitative Representation of Spatial Knowledge. Lecture Notes in Artificial Intelligence. Vol. 804, Ed. Springer-Verlag, 1994.
  • Stèpánková, O. , "An Introduction to Qualitative Reasoning," Advanced Topics in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 617, 1992, pp. 404-418.
  • Freksa, C. , "Qualitative Spatial Reasoning," in Mark, D. M. , Frank, A. U. (eds. ), Cognitive and Linguistic Aspects of Geographic Space, pp. 361-372, Kluwer Academic Publishers, Dordrecht, 1991.
  • Werthner, H. Qualitative Reasoning: Modeling and the Generation of Behavior, Springer-Verlag, 1994.
  • Dague, P. , "Qualitative Reasoning: A Survey of Techniques and Applications," Artificial Intelligence Communications, Vol. 8, No. 3-4, 1995, pp. 119-192.
  • Escrig, M. T. , Peris, J. C, "The use of a Reasoning process to solve the almost SLAM problem at the Robocup legged league", Catalonian Conference on Artificial Intelligence, CCIA'05, 2005.
  • Peris, J. C, Escrig, M. T. , "Cognitive Maps for Mobile Robot Navigation: A Hybrid Representation Using Reference Systems", 19th International Workshop on Qualitative Reasoning, Graz, Austria, pp. 179-185, ISBN 3-9502019-0-4, Graz, Austria, 2005.
  • Escrig, M. T. , Peris, J. C. , USA pending patent: "SYSTEMS AND METHODS FOR ESTABLISHING AN ENVIRONMENTAL REPRESENTATION", Cognitive Robots S. L. (www. c-robots. com), October 2010.
  • Shapiro, E. , (editor). Encyclopedia of Artificial Intelligence, Wiley, 1987.
  • Kuipers, B. , "Commonsense Knowledge of Space: Learning from Experience," Proceedings of the 6th International Joint Conference on Artificial Intelligence, pp. 499-501. Los Altos, California. Morgan Kaufman, 1979.
  • Davis, E. , "Commonsense reasoning," in
  • , pp. 1288-1294, 1987.
  • Escrig, M. T. , Toledo, F. , "Qualitative Spatial Reasoning: Theory and Practice. Application to Robot Navigation," IOS Press, Frontiers in Artificial Intelligence and Applications, ISBN 90 5199 4125, Amsterdam, 1998.
  • Freksa, C. & Röhrig, R. , "Dimensions of Qualitative Spatial Reasoning," In Qualitative Reasoning in Decision Technologies, Proc. QUARDET '93, N. Piera Carreté & M. G. Singh, eds. , CIMNE Barcelona 1993, pp. 483-492.
  • Bratko, I. , Suc, D. , "Qualitative data mining and its applications," Proceedings of the 25th International Conference on Information Technology Interfaces 2003 (ITI 2003), pp. 3-8.
  • Zabkar, J. , Mozina, M. , Bratko, I. , Demsar, J. , "Learning qualitative models form numerical data," Artificial Intelligence, vol. 175, No. 9-10, June 2011, pp. 1604-1619.
  • Mattos-Rosa, Th. , Olivo-Santin, A, Malucelli, A. , "Mitigating XLM Injection Zero-Day Attack through Strategy-based Detection system", IEEE Security & Privacy, June 2012.
  • Neo4j Documentation, http://docs. neo4j. org/, accessed on May 13, 2013.
  • Data-Driven Documents, http://d3js. org/, accessed on May 13, 2013