To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A machine learning-based approach to detect threats in bio-cyber DNA storage systems
Department of Mathematics, University of Padova, Torre Archimede, Padova, Italy.ORCID iD: 0000-0001-7640-2944
Örebro University, School of Science and Technology. (Centre for Applied Autonomous Sensor Systems (AASS); Machine Perception & Interaction)ORCID iD: 0000-0001-9293-7711
Department of Mathematics, University of Padova, Torre Archimede, Padova, Italy.ORCID iD: 0000-0002-3612-1934
School of Computing, University of Nebraska-Lincoln, Lincoln, USA.ORCID iD: 0000-0003-4022-3615
2022 (English)In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 187, p. 59-70Article in journal (Refereed) Published
Abstract [en]

Data storage is one of the main computing issues of this century. Not only storage devices are converging to strict physical limits, but also the amount of data generated by users is growing at an unbelievable rate. To face these challenges, data centres grew constantly over the past decades. However, this growth comes with a price, particularly from the environmental point of view. Among various promising media, DNA is one of the most fascinating candidate. In our previous work, we have proposed an automated archival architecture which uses bioengineered bacteria to store and retrieve data, previously encoded into DNA. The similarities between biological media and classical ones can be a drawback, as malicious parties might replicate traditional attacks on the former archival system, using biological instruments and techniques. In this paper, first we analyse the main characteristics of our storage system and the different types of attacks that could be executed on it. Then, aiming at identifying on-going attacks, we propose and evaluate detection techniques, which rely on traditional metrics and machine learning algorithms. We identify and adapt two suitable metrics for this purpose, namely generalized entropy and information distance.

Place, publisher, year, edition, pages
Elsevier, 2022. Vol. 187, p. 59-70
Keywords [en]
DNA encoding, Storage system, DoS, Metrics, Machine learning
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:oru:diva-99709DOI: 10.1016/j.comcom.2022.01.023ISI: 000817094300005Scopus ID: 2-s2.0-85124592700OAI: oai:DiVA.org:oru-99709DiVA, id: diva2:1674125
Available from: 2022-06-21 Created: 2022-06-21 Last updated: 2022-07-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Giaretta, Alberto

Search in DiVA

By author/editor
Tavella, FedericoGiaretta, AlbertoConti, MauroBalasubramaniam, Sasitharan
By organisation
School of Science and Technology
In the same journal
Computer Communications
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 66 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf