Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking
نویسندگان
چکیده
Computer and network security are central issues confronting organizations and individuals. This paper explores the use of biology as a reference discipline that can provide meaningful insight and innovation in the area of network security. Specifically, we propose a framework for thinking about network security by examining the similarities between the defense mechanisms of a cell, and the security processes and methodologies of networked computer systems that defend an organization’s information resources. Researchers and commercial developers can use this framework to help spark ideas that lead to further research and development in network security. The framework also provides a platform for educators in teaching students about the functions of computer network concepts. Our analysis of defense mechanisms in biological cells showed that security in cells is integrated, ubiquitous, and continuous. An example illustrates how the framework can generate ideas for improving network security.
منابع مشابه
Layered Security Framework for Intrusion Prevention
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملCyber-Insurance for Cyber-Security A Solution to the Information Asymmetry Problem
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, according to security experts, such software (an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CAIS
دوره 12 شماره
صفحات -
تاریخ انتشار 2003