Swarming computer security: An experiment in policy distribution

被引:0
|
作者
Menezes, R [1 ]
Ford, R [1 ]
Ondi, A [1 ]
机构
[1] Florida Tech, Ctr Computat & Intelligence, Melbourne, FL USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite all the resources invested in research in computer security, researchers and users alike frequently hear reports of security breaches: in many ways, it looks like researchers are loosing, the battle against attackers. Furthermore, current trends tend to show that if novel approaches to security problems are not explored, things are likely to get worse, not better. A possible approach that may give security experts the upper hand requires them to examine the fundamental causes of security problems. Is it possible that our security woes exist primarily due to an antiquated approach to solving the problem? In this paper, we argue that the answer is yes: one of the fundamental weaknesses of our collective approach is the static nature of most security systems. We then suggest the use of countermeasures based on a more dynamic approach la swarm. We concentrate here on the very important issue of security policy updates and show simulation results which demonstrate the promise of our approach.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [31] Computer security
    Andrews, M
    Whittaker, JA
    IEEE SECURITY & PRIVACY, 2004, 2 (05) : 68 - 71
  • [32] COMPUTER SECURITY
    MOORE, PG
    HARVARD BUSINESS REVIEW, 1985, 63 (06) : 228 - 228
  • [33] COMPUTER SECURITY
    SPINDLE, L
    RADIO-ELECTRONICS, 1984, 55 (02): : 111 - &
  • [34] COMPUTER SECURITY
    DAHL, WA
    HARVARD BUSINESS REVIEW, 1984, 62 (04) : 188 - 188
  • [35] COMPUTER SECURITY
    BROWN, MJC
    BRITISH MEDICAL JOURNAL, 1983, 287 (6400): : 1226 - 1226
  • [36] COMPUTER SECURITY
    Cass, Stephen
    Naone, Erica
    Garfinkel, Simson
    Talbot, David
    Lemos, Robert
    TECHNOLOGY REVIEW, 2010, 113 (04) : 59 - 70
  • [37] COMPUTER SECURITY
    不详
    DUNS BUSINESS MONTH, 1982, 120 (06): : 94 - &
  • [38] Computer security
    Gollmann, Dieter
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (05): : 544 - 554
  • [39] COMPUTER SECURITY
    BRANSTAD, DK
    IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (07) : 10 - 11
  • [40] COMPUTER SECURITY
    FRIEDMAN, H
    RADIO-ELECTRONICS, 1985, 56 (06): : 78 - 79