Sketch of a Generic Security Framework based on the Paradigms of Systemic-Holistic Approach and the Immune System
2005 (English)In: Proceedings for the Information Seurity South Africa conference ISSA2005, 2005Conference paper (Refereed)
Everything that we see can be changed. Internet is vulnerable because it was not designed as awhole system. This can be changed by changing the way we think and approach the developmentof Internet. Initial development of the Internet and other systems focused only on computertechnology and communication’s protocols. Many systems are not secure today because mostresearch has concentrated on securing parts of the systems. Hence, we can change this by viewingsecurity of Internet and other systems holistically, by focusing not just on technology and protocolsbut by considering system’s environments, people using the systems, future of systems and otherfactors. In this paper we view and approach security of systems holistically. We discuss andsuggest a methodology of securing systems based on the paradigms of the Immune system and theSystemic-Holistic approach. The Immune system is used to protect human bodies from for instancedifferent types of viruses. The Systemic-holistic approach views and studies a system as a whole orin details at the theoretical, design, or the implementation level. It takes into considerationstechnical and non-technical aspects and the system’s environment. The generic security frameworkhas been created for using functions inspired by the immune system and the systemic-holisticapproach paradigms to secure systems. The framework contains the deterrence, protection,detection, response and recovery sub-systems. These sub-systems will be generically protectingboth at the border and internally in the system. This methodology will improve the way we designsecurity systems by generically considering different factors and people using the system.
Place, publisher, year, edition, pages
Immune system, Systemic-holistic, negative selection algorithm, clonal selection algorithm, deterrence
IdentifiersURN: urn:nbn:se:kth:diva-34476ISBN: 1-86854-625-XOAI: oai:DiVA.org:kth-34476DiVA: diva2:421684
QC 201106092011-06-092011-06-092011-06-09Bibliographically approved