with emerging threats. Layers within the enterprise
are considered, with emphasis on information sharing
across domains (Bassam and Deborah, 2010). The
inclusion of change, and the layered view of enter-
prises, makes ESM similar to DSF. However, DSF is
not enterprise-specific, allowing it to be used flexibly
in many different scenarios.
These frameworks approach security implemen-
tation predominantly from a business perspective.
However, they do not formalise a process for turn-
ing pure research (T1) into applicable methods (T2).
As such, they do not focus on getting the best out
of available knowledge. They also do not integrate
time and internal/external contexts, and so cannot im-
prove interventions against changing trends and pop-
ulations. We believe that taking inspiration from the
well-established field of health care provides a unique
angle to exploit in generating new ideas for the main-
tenance of network health.
6 CONCLUSIONS
In health care, TR delivers research knowledge to
patients. We have proposed that a similar approach
be applied for botnet mitigation - bringing technical
knowledge and innovative solutions more effectively
to users and networks. To demonstrate this approach,
we utilised the Dynamic Sustainability Framework,
applying it to epidemic modelling scenarios for bot
propagation. We suggested measurement techniques,
highlighted key constructs, and discussed the evalua-
tive process. IS deals with the impact and implemen-
tation of an intervention, allowing us to consider how
we develop multi-faceted approaches, how/where we
deliver them, what meaningful impact they have, and
why they may be lacking. This is vital for improving
and sustaining the health of networks. We hope that
this work contributes towards a discussion about how
we deliver new solutions and how TR may play a role
in this.
REFERENCES
Bassam, S. F. and Deborah, L. F. (2010). Cyber Security
Framework for Enterprise System Development: En-
hancing Domain Security through ESM. In Military
Communications Conference, 2010-MILCOM 2010,
pages 924–929. IEEE.
Bauer, M. S., Damschroder, L., Hagedorn, H., Smith, J., and
Kilbourne, A. M. (2015). An Introduction to Imple-
mentation Science for the Non-Specialist. BMC Psy-
chology, 3(1):32.
Brauer, F. (2008). Compartmental Models in Epidemiol-
ogy. In Mathematical Epidemiology, pages 19–79.
Springer.
Chambers, D. A., Glasgow, R. E., and Stange, K. C. (2013).
The Dynamic Sustainability Framework: Addressing
the Paradox of Sustainment Amid Ongoing Change.
Implementation Science, 8(1):117.
Dagon, D., Zou, C. C., and Lee, W. (2006). Modeling Bot-
net Propagation Using Time Zones. In NDSS, vol-
ume 6, pages 2–13.
Dedeke, A. (2017). Cybersecurity Framework Adoption:
Using Capability Levels for Implementation Tiers and
Profiles. IEEE Security Privacy, 15(5):47–54.
Galea, S. (2013). An Argument for a Consequentialist
Epidemiology. American Journal of Epidemiology,
178(8):1185–1191.
Khalil, H. (2016). Knowledge Translation and Implemen-
tation Science: What is the Difference.
Khouzani, M., Altman, E., and Sarkar, S. (2012). Optimal
Quarantining of Wireless Malware through Reception
Gain Control. IEEE Transactions on Automatic Con-
trol, 57(1):49–61.
Lu, Z., Wang, W., and Wang, C. (2016). On the Evolu-
tion and Impact of Mobile Botnets in Wireless Net-
works. IEEE Transactions on Mobile Computing,
15(9):2304–2316.
NIST (2014). Framework for Improving Critical Infrastruc-
ture Cybersecurity. Last accessed 5th January 2018.
Rubio, D. M., Schoenbaum, E. E., Lee, L. S., Schteingart,
D. E., Marantz, P. R., Anderson, K. E., Platt, L. D.,
Baez, A., and Esposito, K. (2010). Defining Trans-
lational Research: Implications for Training. Aca-
demic Medicine: Journal of the Association of Ameri-
can Medical Colleges, 85(3):470.
Sanzgiri, A., Joyce, J., and Upadhyaya, S. (2012). The Early
(Tweet-ing) Bird Spreads the Worm: An Assessment
of Twitter for Malware Propagation. Procedia Com-
puter Science, 10:705–712.
Woolf, S. H. (2008). The Meaning of Translational Re-
search and Why it Matters. Jama, 299(2):211–213.
Yan, G., Chen, G., Eidenbenz, S., and Li, N. (2011). Mal-
ware Propagation in Online Social Networks: Nature,
Dynamics, and Defense Implications. In Proceedings
of the 6th ACM Symposium on Information, Computer
and Communications Security, pages 196–206. ACM.
Yong, W., Tefera, S. H., and Beshah, Y. K. (2012). Under-
standing Botnet: From Mathematical Modelling to In-
tegrated Detection and Mitigation Framework. In Soft-
ware Engineering, Artificial Intelligence, Networking
and Parallel & Distributed Computing (SNPD), 2012
13th ACIS International Conference on, pages 63–70.
IEEE.
Evaluating the Provision of Botnet Defences using Translational Research Concepts
519