Biologically Inspired Cyber Security

Biologically inspired systems look to nature for metaphors to apply to the cyber security domain. Natural systems are every bit as complex as designed systems, and often have mechanisms (defensive and offensive) that are ripe for application into new domains. Of particular interest to Noetic are distributed intelligence and evolutionarily based metaphors.

Mission Assurance and Resilient Systems

If systems are to be entrusted to provide mission-critical capabilities then there needs to be a means of having a reasonable assurance that the system will be available. On the one hand this refers to the concept of metrics; providing measurable prediction or reporting of how a system behaves under attack. More interestingly, this also implies systems with the capability to continue fighting through an attack.

Cyber Modeling and Simulation

Modeling and simulation for cyber security is an area that has been neglected. Rather, approaches to cyber modeling and simulation either operate at extremely high or extremely low scales. What happens at the lowest levels is fairly well understood. Additionally, people often make assumptions about how that applies to the campaign level of simulation. There is little effort on bridging this gap in a sound manner. Noetic is interested in building technologies to bridge this gap, partially due to the applications in metrics and reslient systems.

Insider Threat

Most cyber security domains assume threat stops at the enterprise border. This is rarely the case, however. Both malicious (and simply negligent) insiders are responsible for a great deal of attacks. Noetic is interested in finding mechanisms to combat this, and has considered biologically inspired approaches to this problem.


Noetic is interested in improving mechanisms for detecting, and combating, compromised systems and malware. The state of the art relies upon hueristic approaches. While these approaches are generally good enough, Noetic feels that they could be improved through expanding this technology area into new areas.