'DNA-proofing' for computer systems - a new approach to computer security?

被引:0
作者
Louwrens, CP [1 ]
Von Solms, SH [1 ]
机构
[1] Rand Afrikaans Univ, Dept Comp Sci, ZA-2006 Johannesburg, South Africa
来源
INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES | 2000年 / 47卷
关键词
computer security; DNA-proofing; anti-virus technology; biological model; immune system; autonomous intelligent software agents;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern day network-centric computing can increasingly be viewed as a vast, extremely involved organism, of which the boundaries are not clear, and most of the constituent parts are unkown from any given viewpoint. It may even become impossible to ensure the security of computing systems in future with current approaches to computer security. On the other hand, nature has been successful in defending its complex biological systems from infection and damage for countless millennia by using highly specialized and evolved immune systems. It is therefore postulated that a highly effective defensive mechanism can be developed, to transparently enforce an acceptable level of security in very extensive and complex computer networks and systems, by building very basic, but specialized autonomous agents, that follow basic rules that can be deduced from biological immune systems. Key to this concept is the biological system's ability to distinguish what belongs to it and what is foreign and therefore needs to be destroyed. This is done, inter alia, via genetic information contained in the DNA of each cell. Central to the proposed immune model is thus the concept of 'DNA-proofing'.
引用
收藏
页码:121 / 129
页数:5
相关论文
共 16 条
[1]  
BERLOWITS S, 1998, LECT NOTES COMPUTER, V1419
[2]  
BISHOP JE, 1991, GENOME
[3]  
*CEMEB, 1999, 154081 CEMEB ISO IEC
[4]  
CHESS DM, 1998, LECT NOTES COMPUTER, V1419
[5]  
Clark WR, 1995, WAR DOUBLE EDGED SWO
[6]  
DWYER J, 1993, BODY WAR STORY IMMUN
[7]   No suprises in Melissa land [J].
Ford, R .
COMPUTERS & SECURITY, 1999, 18 (04) :300-302
[8]  
HOHL F, 1998, LECT NOTES COMPUTER, V1419
[9]  
LING NR, 1992, PRINCIPLES PRACTICE
[10]  
LOUWRENS CP, 1998, GLOBAL IT SECURITY