Descriptive Analyses of Trusted Security Kernels and Autonomous Systems : Evolution of Security Approaches

Security countermeasures have been geared toward building fortified systems that focus on prevention and detection of attacks, and recovery from damage. However, according to the Defense Advanced Research Projects Agency (DARPA), given the increasing mobility of computing devices, security approaches must radically change to be effective. Some ways of working towards these ends are in creating systems that can reason and draw inferences and predictions about security vulnerabilities and threats. Among the most important advances are in systems that are adaptive and selfhealing deriving from human biology and sociology. Thus security systems are aiming at resilience and adaptation –this is called socio-biologically inspired security. We contrast two approaches: Trusted kernels and sociological agentic systems to help security managers weigh decisions to fit the best approach based on needs and systems architecture.

[1]  Seong-Moo Yoo,et al.  Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System , 2009, Security and Management.

[2]  Su Yan,et al.  A Stochastic Model of the Damage Propagation in Database Systems , 2009, Security and Management.

[3]  Richard Ford,et al.  A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks , 2008, Inf. Secur. J. A Glob. Perspect..

[4]  Luciana Andréia Fondazzi Martimiano,et al.  Ontologies for information security management and governance , 2008, Inf. Manag. Comput. Secur..

[5]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[6]  Mohd Aizaini Maarof,et al.  Danger Theory and Intelligent Data Processing , 2007 .

[7]  Guido Boella,et al.  Admissible agreements among goal-directed agents , 2005, IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[8]  Michal Feldman,et al.  Overcoming free-riding behavior in peer-to-peer systems , 2005, SECO.

[9]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[10]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[11]  Panayotis Antoniadis,et al.  Comparing economic incentives in peer-to-peer networks , 2004, Comput. Networks.

[12]  Hector Garcia-Molina,et al.  SLIC: a selfish link-based incentive mechanism for unstructured peer-to-peer networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[13]  Niels Provos,et al.  Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.

[14]  Frank Dignum,et al.  A Programming Language for Cognitive Agents Goal Directed 3APL , 2003, PROMAS.

[15]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[16]  Noam Chomsky Human Language and Other Semiotic Systems , 1979 .