TY - GEN
T1 - 'DNA-proofing' for computer systems-A new approach to computer security?
AU - Louwrens, C. P.
AU - von Solms, S. H.
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2000.
PY - 2017
Y1 - 2017
N2 - Modem day network-centric computing can increasingly be viewed as a vast, extremely involved organism, of which the boundaries are not clear, and most of the constituent parts are unknown from any given viewpoint. It may even become impossible to ensure the security of computing systems in future with current approaches to computer security. On the other hand, nature has been successful in defending its complex biological systems from infection and damage for countless millennia by using highly specialized and evolved immune systems. It is therefore postulated that a highly effective defensive mechanism can be developed, to transparently enforce an acceptable level of security in very extensive and complex computer networks and systems, by building very basic, but specialized autonomous agents, that follow basic rules that can be deduced from biological immune systems. Key to this concept is the biological system's ability to distinguish what belongs to it and what is foreign and therefore needs to be destroyed. This is done, inter alia, via genetic information contained in the DNA of each cell. Central to the proposed immune model is thus the concept of 'DNA-proofing'.
AB - Modem day network-centric computing can increasingly be viewed as a vast, extremely involved organism, of which the boundaries are not clear, and most of the constituent parts are unknown from any given viewpoint. It may even become impossible to ensure the security of computing systems in future with current approaches to computer security. On the other hand, nature has been successful in defending its complex biological systems from infection and damage for countless millennia by using highly specialized and evolved immune systems. It is therefore postulated that a highly effective defensive mechanism can be developed, to transparently enforce an acceptable level of security in very extensive and complex computer networks and systems, by building very basic, but specialized autonomous agents, that follow basic rules that can be deduced from biological immune systems. Key to this concept is the biological system's ability to distinguish what belongs to it and what is foreign and therefore needs to be destroyed. This is done, inter alia, via genetic information contained in the DNA of each cell. Central to the proposed immune model is thus the concept of 'DNA-proofing'.
KW - Anti-virus technology
KW - Autonomous intelligent software agents
KW - Biological model
KW - Computer security
KW - DNA-proofing
KW - Immune system
UR - http://www.scopus.com/inward/record.url?scp=85066147650&partnerID=8YFLogxK
U2 - 10.1007/978-0-387-35515-3_13
DO - 10.1007/978-0-387-35515-3_13
M3 - Conference contribution
AN - SCOPUS:85066147650
SN - 9781475754797
T3 - IFIP Advances in Information and Communication Technology
SP - 121
EP - 129
BT - Information Security for global information infrastructures IFIP TC11- 16th Annual Working Conference on Information Security, 2000
A2 - Eloff, Jan H.P.
A2 - Qing, Sihan
PB - Springer New York LLC
T2 - 16th IFIP World Computer Congress, WCC 2000
Y2 - 21 August 2000 through 25 August 2000
ER -