Your browser doesn't support javascript.
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks.
Islam, M S; Ivanov, S; Awan, H; Drohan, J; Balasubramaniam, S; Coffey, L; Kidambi, S; Sri-Saan, W.
  • Islam MS; VistaMilk Research Centre, Walton Institute, South East Technological University, Waterford, Ireland. sibleeislam@gmail.com.
  • Ivanov S; VistaMilk Research Centre, Walton Institute, South East Technological University, Waterford, Ireland.
  • Awan H; Munster Technological University, Cork, Ireland.
  • Drohan J; Pharmaceutical and Molecular Biotechnology Research Centre, South East Technological University, Waterford, Ireland.
  • Balasubramaniam S; School of Computing, University of Nebraska-Lincoln, Lincoln, NE, USA.
  • Coffey L; Pharmaceutical and Molecular Biotechnology Research Centre, South East Technological University, Waterford, Ireland.
  • Kidambi S; Department of Chemical and Biomolecular Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA.
  • Sri-Saan W; School of Computing, University of Nebraska-Lincoln, Lincoln, NE, USA.
Sci Rep ; 12(1): 9631, 2022 06 10.
Article in English | MEDLINE | ID: covidwho-1927094
ABSTRACT
This article uses Deep Learning technologies to safeguard DNA sequencing against Bio-Cyber attacks. We consider a hybrid attack scenario where the payload is encoded into a DNA sequence to activate a Trojan malware implanted in a software tool used in the sequencing pipeline in order to allow the perpetrators to gain control over the resources used in that pipeline during sequence analysis. The scenario considered in the paper is based on perpetrators submitting synthetically engineered DNA samples that contain digitally encoded IP address and port number of the perpetrator's machine in the DNA. Genetic analysis of the sample's DNA will decode the address that is used by the software Trojan malware to activate and trigger a remote connection. This approach can open up to multiple perpetrators to create connections to hijack the DNA sequencing pipeline. As a way of hiding the data, the perpetrators can avoid detection by encoding the address to maximise similarity with genuine DNAs, which we showed previously. However, in this paper we show how Deep Learning can be used to successfully detect and identify the trigger encoded data, in order to protect a DNA sequencing pipeline from Trojan attacks. The result shows nearly up to 100% accuracy in detection in such a novel Trojan attack scenario even after applying fragmentation encryption and steganography on the encoded trigger data. In addition, feasibility of designing and synthesizing encoded DNA for such Trojan payloads is validated by a wet lab experiment.
Subject(s)

Full text: Available Collection: International databases Database: MEDLINE Main subject: Computer Security / Deep Learning Type of study: Prognostic study Language: English Journal: Sci Rep Year: 2022 Document Type: Article Affiliation country: S41598-022-13700-5

Similar

MEDLINE

...
LILACS

LIS


Full text: Available Collection: International databases Database: MEDLINE Main subject: Computer Security / Deep Learning Type of study: Prognostic study Language: English Journal: Sci Rep Year: 2022 Document Type: Article Affiliation country: S41598-022-13700-5