@article{4f6d29b2123c465fa9f699d52162aef5,
title = "Challenges in cybersecurity: Lessons from biological defense systems",
abstract = "Defending against novel, repeated, or unpredictable attacks, while avoiding attacks on the {\textquoteleft}self{\textquoteright}, are the central problems of both mammalian immune systems and computer systems. Both systems have been studied in great detail, but with little exchange of information across the different disciplines. Here, we present a conceptual framework for structured comparisons across the fields of biological immunity and cybersecurity, by framing the context of defense, considering different (combinations of) defensive strategies, and evaluating defensive performance. Throughout this paper, we pose open questions for further exploration. We hope to spark the interdisciplinary discovery of general principles of optimal defense, which can be understood and applied in biological immunity, cybersecurity, and other defensive realms.",
keywords = "Complex systems, Cybersecurity, Defense, Immunology",
author = "Edward Schrom and Ann Kinzig and Stephanie Forrest and Graham, {Andrea L.} and Levin, {Simon A.} and Bergstrom, {Carl T.} and Carlos Castillo-Chavez and Collins, {James P.} and {de Boer}, {Rob J.} and Adam Doup{\'e} and Roya Ensafi and Stuart Feldman and Grenfell, {Bryan T.} and Halderman, {J. Alex} and Silvie Huijben and Carlo Maley and Melanie Moses and Perelson, {Alan S.} and Charles Perrings and Joshua Plotkin and Jennifer Rexford and Mohit Tiwari",
note = "Funding Information: The authors would like to thank Arizona State University's College of Liberal Arts and Sciences for providing the funding for the workshops that led to this paper as well as Princeton University for hosting one of the workshops. Benjamin Edwards contributed to Table 1. The authors would also like to acknowledge U.S. Army Research Office Grant No. W911NF-18-1-0325; National Science Foundation, United States2115075, 2211750, and CNS-1518888; Defense Advanced Research Projects Agency, United StatesN6600120C4020; and U.S. Air Force Research Laboratory AFRLFA8750-19-1-0501. Funding Information: The authors would like to thank Arizona State University{\textquoteright}s College of Liberal Arts and Sciences for providing the funding for the workshops that led to this paper as well as Princeton University for hosting one of the workshops. Benjamin Edwards contributed to Table 1 . The authors would also like to acknowledge U.S. Army Research Office Grant No. W911NF-18-1-0325 ; National Science Foundation, United States 2115075 , 2211750 , and CNS-1518888 ; Defense Advanced Research Projects Agency, United States N6600120C4020 ; and U.S. Air Force Research Laboratory AFRL FA8750-19-1-0501 . Publisher Copyright: {\textcopyright} 2023 Elsevier Inc.",
year = "2023",
month = aug,
doi = "10.1016/j.mbs.2023.109024",
language = "English (US)",
volume = "362",
journal = "Mathematical Biosciences",
issn = "0025-5564",
publisher = "Elsevier Inc.",
}