Abstract
Modem day network-centric computing can increasingly be viewed as a vast, extremely involved organism, of which the boundaries are not clear, and most of the constituent parts are unknown from any given viewpoint. It may even become impossible to ensure the security of computing systems in future with current approaches to computer security. On the other hand, nature has been successful in defending its complex biological systems from infection and damage for countless millennia by using highly specialized and evolved immune systems. It is therefore postulated that a highly effective defensive mechanism can be developed, to transparently enforce an acceptable level of security in very extensive and complex computer networks and systems, by building very basic, but specialized autonomous agents, that follow basic rules that can be deduced from biological immune systems. Key to this concept is the biological system’s ability to distinguish what belongs to it and what is foreign and therefore needs to be destroyed. This is done, inter alia, via genetic information contained in the DNA of each cell. Central to the proposed immune model is thus the concept of ‘DNA-proofing’
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
Key words
References
Bishop, Jerry, E. and Waldholz, Michael, (1991), GENOME, Touchstone, Simon & Shuster, New York.
Chess, David M. (1998): Security Issues in Mobile Code Systems,in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Clark, William R. (1995), At War Within, The Double-Edged Sword of Immunity, Oxford University Press, New York.
Dwyer, John, (1993), The body at war, The story of our immune system, Second Edition, J M Dent, London.
Ford, Richard, (1999): No Surprises in Melissa Land,Computers & Security, Vol. 18, No. 4, 300–302, Elsevier Science Ltd.
Hohl, Fritz (1998): Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Ling, Noel, R.: Cells of the immune system,in Klara Miller, John Turk & Stephen Nicklin (Eds) (1992): Principles and Practice of Immunotoxicology, Blackwell Scientific publications, Osney Mead, Oxford, OX2 OEL.
Louwrens, C.P. and Von Solms, S.H. (1998) Can computerized immunity be achieved, based on a biological model? in György Papp; Reinhard Posch (eds. ), Global IT Security
Proceedings of the XV.IFIP World Computer Congress 31 August — 4 September 1998, Austrian Computer Society, Wollzeile 1–3 1010 Vienna, Austria.
Miller,Greg,(1997), Anti-virus technology moves forward,CNN Sci-Tech, http://www.cnn.com/TECH/9710/21/anti.virus.technology.lat/, October 21, 1997.
Necula, George C. and Lee, Peter (1998): Safe, Untrusted Agents using Proof–Carrying Code in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Riordan, James; Schneider, Bruce (1998): Environmental Key Generation Towards Clueless Agents,in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Sander, Thomas, Tschudin, Christian F. (1998): Protecting Mobile Agents Against Malicious Hosts,in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Shimson Berlowits, Joshua D. Guttman, Vipin Swarup (1998): Authentication for Mobile Agents,in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Steels, Luc, (Ed),(1995): The Biology and Technology of Intelligent Autonomous Agents,NATO ASI Series, Series F: Computer and Systems Sciences, Vol. 144, Springer-Verlag, Berlin.
The Common Evaluation Methodology (CEM) Editorial Board (CEMEB)(1999): Common Criteria (CC) for Information Technology Security Evaluation,ISO/IEC 15408–1: 1999 (E), http://csrc.nist.gov.
Vigna, Giovanni, (1998): Cryptographic Traces for Mobile Agents,in Giovanni Vigna (Ed.), (1998): Mobile Agents and Security,Lecture Notes in Computer Science, vol. 1419, Springer–Verlag, ISBN 3–540–64972–9.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Louwrens, C.P., Von Solms, S.H. (2000). ‘DNA-proofing’ for computer systems — a new approach to computer security?. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive