A New Method terms of Cyber Security: Fight, Flight, Freeze Effect

11 May 2024, Version 1
This content is an early or alternative research output and has not been peer-reviewed by Cambridge University Press at the time of posting.

Abstract

This article aims to model the amygdala’s fight, flight, and freeze responses within the context of cybersecurity, to enable more intuitive and rapid responses to cyber threats. The developed model labels each type of cyber attack with numbers attributed to fundamental defense responses. Although the practical effectiveness of the model has not yet been tested, it is theoretically considered to add a new dimension to cybersecurity strategies. The article proposes that this approach could improve the adaptation of cybersecurity systems to the dynamic and continuously changing threat environment and make defense mechanisms more flexible.

Keywords

Artificial neural networks
Cybersecurity
Amygdala
Fight response
Flight response
Freeze response
Threat modeling
Intuitive defense
Dynamic adaptation
Flexible defense mechanisms

Supplementary materials

Title
Description
Actions
Title
Cyber Attack Table
Description
This table is modeled after the chemical periodic table and serves as an example and representation for classifying cyber attacks. Each number corresponds to a different type of cyber attack and is grouped accordingly. It is proposed as an alternative to CVE codes. Considering that cyber security attacks are constantly evolving and mutating, this means that attackers are continually developing new methods to overcome new defense measures. Cyber attackers use advancements in technology and vulnerabilities in security measures to constantly change and adapt their attack strategies. Accordingly, each numerical range and the ongoing types of attack types represent the advanced process of this mutated or evolved type of cyber attack. (e.g., 4: Man in the Middle, 4.1: ARP Snooping, 4.2: DNS Snooping, 4.3: SSL Stripping, 4.4: Wi-Fi Hacking, etc.)
Actions
Title
“Fight, Flight, Freeze” interactive action plan in terms of cyber security
Description
The “Fight” command ensures security by responding to attacks through encryption, voice-generated encryption, or biometric identification. Encryption is a commonly used method to secure communication and protect data. Particularly during the transfer or storage of data, encrypting the data is crucial for maintaining data integrity and confidentiality. When faced with an unidentified cyber attack, we activated the “FLIGHT” command in the system to lock it down. After generating a report, we proceeded with the backup and update process to ensure the system’s security and data integrity. In this code, the steps to be taken in the system in the event of a detected cyber attack are specified. First, we executed the “freeze” command to freeze the system, then we carried out data backup and update processes, and finally, we created an attack report.
Actions

Comments

Comments are not moderated before they are posted, but they can be removed by the site moderators if they are found to be in contravention of our Commenting and Discussion Policy [opens in a new tab] - please read this policy before you post. Comments should be used for scholarly discussion of the content in question. You can find more information about how to use the commenting feature here [opens in a new tab] .
This site is protected by reCAPTCHA and the Google Privacy Policy [opens in a new tab] and Terms of Service [opens in a new tab] apply.