The implications of immunology for secure systems design

被引:4
|
作者
Hofmeyr, S
机构
[1] San Mateo, CA 94403
关键词
immunology; computer security; intrusion detection; robustness; damage-response; false positive; false negative;
D O I
10.1016/S0167-4048(04)00166-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The immune system can be a powerful model for understanding and improving computer security. In this article we explore the analogy, starting with a description of early work at discovering "peptides" for computer systems in the form of sequences of system calls, and moving on to the implications of immunology for secure systems design. In particular, we discuss how the immune system tolerates errors, and how we can borrow these ideas to improve the robustness of our computer systems. We observe that a key aspect of the biology is that the immune system and the body have co-evolved so that the body is easier to protect; what we need is a similar co-evolution of computer systems and the methods we use to secure them. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:453 / 455
页数:3
相关论文
共 50 条
  • [1] SECURE SYSTEMS DESIGN
    Van Doorn, Leendert
    2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,
  • [2] Secure systems design technology
    Zegzhda, PD
    Zegzhda, DP
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 63 - 71
  • [3] An LPI Design for Secure OFDM Systems
    Bouanen, Marwen
    Gagnon, Francois
    Kaddoum, Georges
    Couillard, Denis
    Thibeault, Claude
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [4] User interaction design for secure systems
    Yee, KP
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 278 - 290
  • [5] Design of Secure Medical Database Systems
    S Afr Comput J, 17 (45):
  • [6] Security patterns and secure systems design
    Fernandez, Eduardo B.
    Dependable Computing, Proceedings, 2007, 4746 : 233 - 234
  • [7] Secure Design and Verification of Erlang Systems
    Fordos, Viktoria
    PROCEEDINGS OF THE 19TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, ERLANG 2020, 2020, : 31 - 40
  • [8] SECURE COLLABORATION IN ENGINEERING SYSTEMS DESIGN
    Wang, Shumiao
    Bhandari, Siddharth
    Atallah, Mikhail
    Panchal, Jitesh H.
    Ramani, Karthik
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2014, VOL 1B, 2014,
  • [9] Secure Collaboration in Engineering Systems Design
    Wang, Shumiao
    Bhandari, Siddharth
    Chaduvula, Siva Chaitanya
    Atallah, Mikhail J.
    Panchal, Jitesh H.
    Ramani, Karthik
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2017, 17 (04)
  • [10] A design theory for secure information systems design methods
    Siponen, Mikko
    Baskerville, Richard
    Heikka, Juhani
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2006, 7 (11): : 725 - U1