Swarming computer security: An experiment in policy distribution

被引:0
|
作者
Menezes, R [1 ]
Ford, R [1 ]
Ondi, A [1 ]
机构
[1] Florida Tech, Ctr Computat & Intelligence, Melbourne, FL USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite all the resources invested in research in computer security, researchers and users alike frequently hear reports of security breaches: in many ways, it looks like researchers are loosing, the battle against attackers. Furthermore, current trends tend to show that if novel approaches to security problems are not explored, things are likely to get worse, not better. A possible approach that may give security experts the upper hand requires them to examine the fundamental causes of security problems. Is it possible that our security woes exist primarily due to an antiquated approach to solving the problem? In this paper, we argue that the answer is yes: one of the fundamental weaknesses of our collective approach is the static nature of most security systems. We then suggest the use of countermeasures based on a more dynamic approach la swarm. We concentrate here on the very important issue of security policy updates and show simulation results which demonstrate the promise of our approach.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [1] MANAGING COMPUTER SECURITY - METHODOLOGY AND POLICY
    ELOFF, JHP
    BADENHORST, KP
    INFORMATION AGE, 1990, 12 (04): : 213 - 216
  • [2] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [3] Global swarming, virtual security, and Bosnia
    Derian, JD
    WASHINGTON QUARTERLY, 1996, 19 (03): : 45 - 56
  • [4] SecureTorrent: A security framework for file swarming
    Wilson, Kenneth
    Machanick, Philip
    ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, PROCEEDINGS, 2006, 4186 : 538 - 544
  • [5] Developing a computer security policy for organizational use and implementation
    Forcht, Karen A.
    Ayers, Walter Cary
    Journal of Computer Information Systems, 2001, 41 (02) : 52 - 57
  • [6] Developing a computer security policy for organizational use and implementation
    Forcht, KA
    Ayers, WC
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2000, 41 (02) : 52 - 57
  • [7] Proactive Monitoring of Security Policy Accomplishment in Computer Networks
    Kotenko, Igor
    Bogdanov, Vitaly
    2009 IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2009, : 364 - 369
  • [8] Computer simulation and experiment research on security of skew bridge structure
    Wang, Wenrui
    Information Technology Journal, 2013, 12 (17) : 4141 - 4147
  • [9] Computer network security virtual experiment system design and implementation
    Liu Zhijun
    PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2015), 2015, : 309 - 313
  • [10] Computer Simulation of an Armoured Battalion Swarming
    Jankovic, Radomir
    DEFENCE SCIENCE JOURNAL, 2011, 61 (01) : 36 - 43