CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Lessons Learned from Robotics Applied to Cyber Security

by Teresa Escrig, Sam Chung
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 8
Year of Publication: 2013
Authors: Teresa Escrig, Sam Chung
10.5120/12904-9795

Teresa Escrig, Sam Chung . Lessons Learned from Robotics Applied to Cyber Security. International Journal of Computer Applications. 74, 8 ( July 2013), 12-18. DOI=10.5120/12904-9795

@article{ 10.5120/12904-9795,
author = { Teresa Escrig, Sam Chung },
title = { Lessons Learned from Robotics Applied to Cyber Security },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 8 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number8/12904-9795/ },
doi = { 10.5120/12904-9795 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:41:42.328134+05:30
%A Teresa Escrig
%A Sam Chung
%T Lessons Learned from Robotics Applied to Cyber Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 8
%P 12-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An extensive research and development activity of almost twenty years in two fields of Artificial Intelligence - Robotics and Cognitive Vision, can bring new perspectives to Cyber Security field. At the beginning, there was a knowledge gap between the different fields that we needed to bridge. This paper is about the lessons learnt from Robotics that can be transferred into Cyber Security as wisdom to provide the basis for a holistic strategy to mitigate the severe and increasing Cyber Security problems.

References
  1. Martin Hilbert and Priscila López, The World's Technological Capacity to Store, Communicate, and Compute Information, Science, 11 February 2011, pp. 692-693.
  2. National Security Council, Cybersecurity, www. whitehouse. gov/administration/eop/nsc/cybersecurity, accessed on June 6, 2013.
  3. L. Hively, F. Sheldo, A. Cinzia-Squicciarini, "Toward Scalable Trustworthy Computing Using the Human- Physiology-Immunity Metaphor", IEEE Security & Privacy, Vol. 9, Issue 4, July-Aug 2011, pp. 14-23.
  4. F. T. Sheldon and C. A. Vishik, "Moving toward Trustworthy Systems: R&D Essentials," IEEE Computer, vol. 43, no. 9, September 2010, pp. 31–40.
  5. K. R. Karthikeyan and A. Indra, "Intrusion Detection Tools and Techniques – A Survey," International Journal of Computer Theory and Engineering, Vol. 2, No. 6, December, 2010, pp. 901-906.
  6. B. Morel, "Artificial Intelligence a Key to the Future of CyberSecurity", 4th ACM workshop on Artificial Intelligence and Security (AISEC2011), October 21, 2011, Chicago, IL, USA, pp. 93-97.
  7. M. Pradhan, S. K. Pradhan, and S. K. Sahu, "A Survey on Detection Methods in Intrusion Detection Systems," International Journal of Computer Application, Issue 2, Volume 3, June 2012. pp. 81-90.
  8. Javitz, H. , Valdes, A. , "The NIDES Statistical Component Description and Justification", SRI International Annual Report, March 7, 1994.
  9. Bace, R. "Intrusion Detection," ISBN 1-57870-185-6, 2001.
  10. Axelsson, S. , "Research in Intrusion-Detection Systems: A Survey," TR 98-17. Goteborg, Sweden: Department of Computer Engineering, Chalmers University of Technology, 1999. http://www. cs. unc. edu/~jeffay/courses/nidsS05/surveys/Axelson99-ids-survey. pdf
  11. Fox, K. L. , Henning, R. R. , Reed, J. H. , Simonian, R. P. , "A Neural Network Approach Towards Intrusion Detection," in NIST (Ed. ) Proceedings of the 13th National Computer Security Conference, October, 1990.
  12. Lindqvist, U. , Porras, P. A. , "Detecting computing and networking misuse through the production-based expert system toolset (P-BEST)," in L. Gong & M. Reiter (eds. ) Proceeding of the IEEE symposium on security and privacy, IEEE Computer Society, pp. 146-161, Los Alamitos, CA, 1999.
  13. Kumar, S, Spafford, E. H. , "A pattern-matching model for misuse intrusion detection," In NIST (Ed. ), Proceeding of the 17th National Computer Security Conference, National Institute of Standards and Technology (NIST), pp. 11-21, Baltimore, 1994.
  14. Ludovic, M. , "ASSATA: A Genetic algorithm as an Alternative Tool for Security Audit Trails Analysis," RAID, 1998.
  15. Stiawan, D. et al. "Intrusion Prevention System: a Survey," Journal of Theoretical and Applied Information Technology, Vol. 40, No. 1. June 2012. pp. 44-54
  16. Hernández, D. , Qualitative Representation of Spatial Knowledge. Lecture Notes in Artificial Intelligence. Vol. 804, Ed. Springer-Verlag, 1994.
  17. Stèpánková, O. , "An Introduction to Qualitative Reasoning," Advanced Topics in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 617, 1992, pp. 404-418.
  18. Freksa, C. , "Qualitative Spatial Reasoning," in Mark, D. M. , Frank, A. U. (eds. ), Cognitive and Linguistic Aspects of Geographic Space, pp. 361-372, Kluwer Academic Publishers, Dordrecht, 1991.
  19. Werthner, H. Qualitative Reasoning: Modeling and the Generation of Behavior, Springer-Verlag, 1994.
  20. Dague, P. , "Qualitative Reasoning: A Survey of Techniques and Applications," Artificial Intelligence Communications, Vol. 8, No. 3-4, 1995, pp. 119-192.
  21. Escrig, M. T. , Peris, J. C, "The use of a Reasoning process to solve the almost SLAM problem at the Robocup legged league", Catalonian Conference on Artificial Intelligence, CCIA'05, 2005.
  22. Peris, J. C, Escrig, M. T. , "Cognitive Maps for Mobile Robot Navigation: A Hybrid Representation Using Reference Systems", 19th International Workshop on Qualitative Reasoning, Graz, Austria, pp. 179-185, ISBN 3-9502019-0-4, Graz, Austria, 2005.
  23. Escrig, M. T. , Peris, J. C. , USA pending patent: "SYSTEMS AND METHODS FOR ESTABLISHING AN ENVIRONMENTAL REPRESENTATION", Cognitive Robots S. L. (www. c-robots. com), October 2010.
  24. Shapiro, E. , (editor). Encyclopedia of Artificial Intelligence, Wiley, 1987.
  25. Kuipers, B. , "Commonsense Knowledge of Space: Learning from Experience," Proceedings of the 6th International Joint Conference on Artificial Intelligence, pp. 499-501. Los Altos, California. Morgan Kaufman, 1979.
  26. Davis, E. , "Commonsense reasoning," in
  27. , pp. 1288-1294, 1987.
  28. Escrig, M. T. , Toledo, F. , "Qualitative Spatial Reasoning: Theory and Practice. Application to Robot Navigation," IOS Press, Frontiers in Artificial Intelligence and Applications, ISBN 90 5199 4125, Amsterdam, 1998.
  29. Freksa, C. & Röhrig, R. , "Dimensions of Qualitative Spatial Reasoning," In Qualitative Reasoning in Decision Technologies, Proc. QUARDET '93, N. Piera Carreté & M. G. Singh, eds. , CIMNE Barcelona 1993, pp. 483-492.
  30. Bratko, I. , Suc, D. , "Qualitative data mining and its applications," Proceedings of the 25th International Conference on Information Technology Interfaces 2003 (ITI 2003), pp. 3-8.
  31. Zabkar, J. , Mozina, M. , Bratko, I. , Demsar, J. , "Learning qualitative models form numerical data," Artificial Intelligence, vol. 175, No. 9-10, June 2011, pp. 1604-1619.
  32. Mattos-Rosa, Th. , Olivo-Santin, A, Malucelli, A. , "Mitigating XLM Injection Zero-Day Attack through Strategy-based Detection system", IEEE Security & Privacy, June 2012.
  33. Neo4j Documentation, http://docs. neo4j. org/, accessed on May 13, 2013.
  34. Data-Driven Documents, http://d3js. org/, accessed on May 13, 2013
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Security Common Sense Qualitative Models Data Visualization Graph Databases Ontologies