Swarming computer security: An experiment in policy distribution

被引:0
|
作者
Menezes, R [1 ]
Ford, R [1 ]
Ondi, A [1 ]
机构
[1] Florida Tech, Ctr Computat & Intelligence, Melbourne, FL USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite all the resources invested in research in computer security, researchers and users alike frequently hear reports of security breaches: in many ways, it looks like researchers are loosing, the battle against attackers. Furthermore, current trends tend to show that if novel approaches to security problems are not explored, things are likely to get worse, not better. A possible approach that may give security experts the upper hand requires them to examine the fundamental causes of security problems. Is it possible that our security woes exist primarily due to an antiquated approach to solving the problem? In this paper, we argue that the answer is yes: one of the fundamental weaknesses of our collective approach is the static nature of most security systems. We then suggest the use of countermeasures based on a more dynamic approach la swarm. We concentrate here on the very important issue of security policy updates and show simulation results which demonstrate the promise of our approach.
引用
收藏
页码:436 / 439
页数:4
相关论文
共 50 条
  • [41] A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
    Peters, Jan
    Rieke, Roland
    Rochaeli, Taufiq
    Steinemann, Bjoern
    Wolf, Ruben
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 168 (SPEC. ISS.) : 143 - 157
  • [42] Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
    Abboud, Ahmad
    Garcia, Remi
    Lahmadi, Abdelkader
    Rusinowitch, Michael
    Bouhoula, Adel
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [43] SECURITY POLICY AND EUROPEAN SECURITY
    DUCKWITZ, GF
    AUSSEN POLITIK, 1970, 21 (01): : 5 - 13
  • [44] Swarming-based cyber defence under the framework of collective security
    Hadji-Janev, Metodi
    Bogdanoski, Mitko
    SECURITY JOURNAL, 2017, 30 (01) : 39 - 59
  • [45] SECURITY POLICY
    BANKS, SH
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 464 - 471
  • [46] Policy & Security
    Guynes, et al.
    Computers & Society, 269 (1/2):
  • [47] Determination of the equilibrium charge distribution for polyampholytes of different compactness in a single computer experiment
    Siretskiy, Alexey
    Elvingson, Christer
    Khan, Malek O.
    JOURNAL OF PHYSICS-CONDENSED MATTER, 2011, 23 (37)
  • [48] Swarming-based cyber defence under the framework of collective security
    Metodi Hadji-Janev
    Mitko Bogdanoski
    Security Journal, 2017, 30 : 39 - 59
  • [49] Security Metrics Foundations for Computer Security
    Trcek, Denis
    COMPUTER JOURNAL, 2010, 53 (07): : 1106 - 1112
  • [50] PRAC: A novel security access model for power distribution system computer networks
    Wang, Lin
    Li, Celia
    Cheung, Helen
    Yang, Cungang
    Cheung, Richard
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2293 - +