In recent years, many efforts have been made in developing algorithms and methodologies for building efficient network security mechanisms. The primary requirements are efficiency, adaptability, and scalability. Network security mechanisms are composed of several components. First, high-performance network monitoring entities are required allowing the analysis of transmitted data even in high-speed backbone networks. Secondly, algorithms to detect various kinds of threats have to be developed. Based on the monitored data, statistical anomaly detection methods and policy-based filters can be employed. Finally, the control loop must be closed by involving firewall devices against ongoing attacks. Organic computing is attempting to build high-scalable architectures, which are self-organizing, self-maintaining, and self-healing. We try to study the processes in computer networks using mechanisms known from molecular biology as the key paradigm. This novel approach shows many similarities between computer networking and cellular mechanisms. Based on the knowledge about cellular metabolism, new concepts for the behavior patterns of routers, monitor systems, and firewalls can be deduced and the efficiency of individual sub-systems can be increased. This work focuses on the area of network security as one research area with high demand for high-scalable mechanisms providing the needed functionality. We see the proposed mechanism as a generic approach for self-organizing, i.e. self-configuring, self-managing, self-healing, and adaptive solutions in computer networking.
[1]
Rolf P. Würtz,et al.
Organic Computing
,
2004,
Informatik-Spektrum.
[2]
Jeffrey O. Kephart,et al.
A biologically inspired immune system for computers
,
1994
.
[3]
Gerhard Münz,et al.
Attack Detection using Cooperating Autonomous Detection Systems ( CATS )
,
2004
.
[4]
Marco Dorigo,et al.
AntNet: Distributed Stigmergetic Control for Communications Networks
,
1998,
J. Artif. Intell. Res..
[5]
Tatsuya Suda,et al.
The Bio-Networking Architecture: a biologically inspired approach to the design of scalable, adaptive, and survivable/available network applications
,
2001,
Proceedings 2001 Symposium on Applications and the Internet.
[6]
Stephanie Forrest,et al.
Architecture for an Artificial Immune System
,
2000,
Evolutionary Computation.
[7]
Ramesh Govindan,et al.
Cossack: coordinated suppression of simultaneous attacks
,
2003,
Proceedings DARPA Information Survivability Conference and Exposition.
[8]
Georg Carle,et al.
CATS - Cooperating Autonomous Detection Systems
,
2004
.