skip to main content
research-article

Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing

Authors Info & Claims
Published:01 March 2014Publication History
Skip Abstract Section

Abstract

Computing systems and networks become increasingly large and complex with a variety of compromises and vulnerabilities. The network security and privacy are of great concern today, where self-defense against different kinds of attacks in an autonomous and holistic manner is a challenging topic. To address this problem, we developed an innovative technology called Bionic Autonomic Nervous System (BANS). The BANS is analogous to biological nervous system, which consists of basic modules like cyber axon, cyber neuron, peripheral nerve and central nerve. We also presented an innovative self-defense mechanism which utilizes the Fuzzy Logic, Neural Networks, and Entropy Awareness, etc. Equipped with the BANS, computer and network systems can intelligently self-defend against both known and unknown compromises/attacks including denial of services (DoS), spyware, malware, and virus. BANS also enabled multiple computers to collaboratively fight against some distributed intelligent attacks like DDoS. We have implemented the BANS in practice. Some case studies and experimental results exhibited the effectiveness and efficiency of the BANS and the self-defense mechanism.

References

  1. Cunningham, R. K., Lippmann, R. P., and Webster, S. E. 2001. Detecting and displaying novel computer attacks with Macroscope. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 31, 4, 275--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Dai, Y. S. 2005. Autonomic computing and reliability improvement. In Proceedings of the 8th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC’05). 204--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dai, Y. S., Marshall, T., and Guan, X. H. 2006a. Autonomic and dependable computing: Moving towards a model-driven approach. J. Comput. Sci. 2, 6, 496--504.Google ScholarGoogle ScholarCross RefCross Ref
  4. Dai, Y. S., Hinchey, M., Qi, M., and Zou, X. 2006b. Autonomic security and self-protection based on feature recognition with virtual neurons. In Proceedings of the 2nd IEEE Symposium on Dependable, Autonomic and Secure Computing (DASC’06). 227--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dai, Y. S., Pan, Y., and Zou, X. K. 2007a. A hierarchical modeling and analysis for grid service reliability. IEEE Trans. Comput. 56, 5, 681--691. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dai, Y. S., Hinchey, M., and Hu, Q. 2007b. Consequence oriented self-healing and hybrid diagnosis integrating decision diagram, fuzzy logic and neural network. In Proceedings of the 4th IEEE International Workshop on Engineering of Autonomic & Autonomous Systems. 103--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hamilton, J. D. 1994. Time Series Analysis. Princeton University Press.Google ScholarGoogle Scholar
  8. Haykin, S. 1998. Neural Networks: A Comprehensive Foundation. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hinchey, M., Dai, Y. S., Rouff, C. A., Rash, J. L., and Qi, M. 2007. Modeling for NASA autonomous nanotechnology swarm missions and model-driven autonomic computing. In Proceedings of the 21st IEEE International Conference on Advanced Information Networking and Applications (AINA’07). 250--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ioannidis, J. and Bellovin, S. M. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium. 1530--1539Google ScholarGoogle Scholar
  11. Jin, X., Zhang, Y., Pan Y., and Zhou, Y. 2006. ZSBT: A novel algorithm for tracing DOS attackers in MANETS. EURASIP J. Wireless Commun. Network, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kephart, J. and Chess, D. 2003. The vision of autonomic computing. Computer 36, 1, 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Keromytis, A. D., Misra, V., and Rubenstein, D. 2004. SOS: An architecture for mitigating DDoS attacks. IEEE J. Sel. Areas Commun. 22, 1, 176--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Koshutanski, H. and Massacci, F. 2008. Interactive access control for autonomic systems: From theory to implementation. ACM Trans. Auton. Adapt. Syst. 3, 3, Article No. 9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lilien, L. and Bhargava, B. 2006. A scheme for privacy-preserving data dissemination. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 36, 3, 503--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. McLachlan, G. J. 2005. Discriminant Analysis and Statistical Pattern Recognition. John Wiley & Sons.Google ScholarGoogle Scholar
  17. Patterson, D. A., Brown, A., Broadwell, P., et al. 2002. Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies. Tech. rep. UCB//CSD-02-1175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Russell, L., Chiang, H., and Russell, E. L. 2001. Fault Detection and Diagnosis in Industrial Systems. Springer.Google ScholarGoogle Scholar
  19. Xiang, Y. and Zhou, W. 2006. Protecting information infrastructure from DDoS attacks by mark-aided distributed filtering (MADF). Int. J. High Perform. Comput. Networking 4, 5/6, 357--367. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xiang, Y., Zhou, W., and Guo, M. 2008. Flexible deterministic packet marking: An IP traceback system to find the real source of attacks. IEEE Trans. Parallel Distrib. Syst. 20, 4, 567--580. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yu, S., Zhou, W., and Doss, R. 2008. Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12, 4, 319--321.Google ScholarGoogle Scholar
  22. Zhang, S. and Dasgupta, P. 2003. Denying denial-of-service attacks: A router based solution. In Proceedings of the International Conference on Internet Computing. 301--307Google ScholarGoogle Scholar
  23. Zhou, W., Xiang, Y., and Guo, M. 2008. Network attacks and defense systems. Computer Syst. Sci. Eng. 23, 3, 137--138.Google ScholarGoogle Scholar
  24. Zou, X., Dai, Y. S., and Bertino, E. 2008. A practical and flexible key management mechanism for trusted collaborative computing. In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM’08). 1211--1219.Google ScholarGoogle Scholar

Index Terms

  1. Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!