Principles of Security: Human, Cyber, and Biological

Cybersecurity attacks are a major and increasing burden to economic and social systems globally. Here we analyze the principles of security in different domains and demonstrate an architectural flaw in current cybersecurity. Cybersecurity is inherently weak because it is missing the ability to defend the overall system instead of individual computers. The current architecture enables all nodes in the computer network to communicate transparently with one another, so security would require protecting every computer in the network from all possible attacks. In contrast, other systems depend on system-wide protections. In providing conventional security, police patrol neighborhoods and the military secures borders, rather than defending each individual household. Likewise, in biology, the immune system provides security against viruses and bacteria using primarily action at the skin, membranes, and blood, rather than requiring each cell to defend itself. We propose applying these same principles to address the cybersecurity challenge. This will require: (a) Enabling pervasive distribution of self-propagating securityware and creating a developer community for such securityware, and (b) Modifying the protocols of internet routers to accommodate adaptive security software that would regulate internet traffic. The analysis of the immune system architecture provides many other principles that should be applied to cybersecurity. Among these principles is a careful interplay of detection and action that includes evolutionary improvement. However, achieving significant security gains by applying these principles depends strongly on remedying the underlying architectural limitations.

[1]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Stephanie Forrest,et al.  Principles of a computer immune system , 1998, NSPW '97.

[3]  N. Pierce Origin of Species , 1914, Nature.

[4]  S. Pierce,et al.  A Role for MHC Class II Antigen Processing in B Cell Development , 2000, International reviews of immunology.

[5]  L. Zakharova Evolution of adaptive immunity , 2009, Biology Bulletin.

[6]  B. Alberts,et al.  Molecular Biology of the Cell (4th Ed) , 2002 .

[7]  Shirley Dex,et al.  JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .

[8]  Yaneer Bar-Yam,et al.  Dynamics Of Complex Systems , 2019 .

[9]  Y. Bar-Yam,et al.  Multiscale analysis of information correlations in an infinite-range, ferromagnetic Ising system. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[11]  R. Lewontin ‘The Selfish Gene’ , 1977, Nature.

[12]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[13]  Yaneer Bar-Yam Complexity Rising : from Human Beings to Human Civilization , a Complexity Profile , 2005 .

[14]  G. Weisbuch,et al.  Immunology for physicists , 1997 .

[15]  John Q. Dickmann,et al.  Complexity of Military Conflict : Multiscale Complex Systems Analysis of Littoral Warfare , 1992 .

[16]  A S Perelson,et al.  Somatic evolution in the immune system: the need for germinal centers for efficient affinity maturation. , 1997, Journal of theoretical biology.

[17]  Y. Bar-Yam Making Things Work: Solving Complex Problems in a Complex World , 2004 .

[18]  Peter J. Bentley,et al.  The Human Immune System and Network Intrusion Detection , 1999 .

[19]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[20]  A. Frey,et al.  T-cell receptor signaling events triggering granule exocytosis. , 2006, Critical reviews in immunology.

[21]  Dorothea Heiss-Czedik,et al.  An Introduction to Genetic Algorithms. , 1997, Artificial Life.

[22]  William G. Glenney Multiscale Representation Phase I , 2001 .

[23]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[24]  D. Forsdyke,et al.  The origins of the clonal selection theory of immunity as a case study for evaluation in science , 1995, FASEB journal : official publication of the Federation of American Societies for Experimental Biology.

[25]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[26]  Yaneer Bar-Yam,et al.  Multiscale variety in complex systems , 2004, Complex..

[27]  Risto Miikkulainen,et al.  Competitive Coevolution through Evolutionary Complexification , 2011, J. Artif. Intell. Res..

[28]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[29]  J. Davies,et al.  Molecular Biology of the Cell , 1983, Bristol Medico-Chirurgical Journal.

[30]  Yaneer Bar-Yam,et al.  A mathematical theory of strong emergence using multiscale variety , 2004, Complex..

[31]  Yaneer Bar-Yam,et al.  Multiscale Complexity/Entropy , 2004, Adv. Complex Syst..

[32]  Yongan Zhang,et al.  B lymphocytes from early vertebrates have potent phagocytic and microbicidal abilities , 2006, Nature Immunology.

[33]  M. Eaman Immune system. , 2000, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[34]  P. Pozzilli,et al.  Autoimmune diabetes not requiring insulin at diagnosis (latent autoimmune diabetes of the adult): definition, characterization, and potential prevention. , 2001, Diabetes care.

[35]  J. Maynard Smith The units of selection. , 2021, Novartis Foundation symposium.

[36]  Gary B. Lamont,et al.  A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.

[37]  R. Lochmiller,et al.  Trade‐offs in evolutionary immunology: just what is the cost of immunity? , 2000 .

[38]  J. Harty,et al.  CD8+ T cell effector mechanisms in resistance to infection. , 2000, Annual review of immunology.

[39]  Jeffrey O. Kephart,et al.  Blueprint for a Computer Immune System , 1999 .

[40]  M. Kehry,et al.  B-cell activation by helper T-cell membranes. , 1994, Critical reviews in immunology.

[41]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[42]  Y. Bar-Yam General Features of Complex Systems , 2011 .