Abstract
Computing systems and networks become increasingly large and complex with a variety of compromises and vulnerabilities. The network security and privacy are of great concern today, where self-defense against different kinds of attacks in an autonomous and holistic manner is a challenging topic. To address this problem, we developed an innovative technology called Bionic Autonomic Nervous System (BANS). The BANS is analogous to biological nervous system, which consists of basic modules like cyber axon, cyber neuron, peripheral nerve and central nerve. We also presented an innovative self-defense mechanism which utilizes the Fuzzy Logic, Neural Networks, and Entropy Awareness, etc. Equipped with the BANS, computer and network systems can intelligently self-defend against both known and unknown compromises/attacks including denial of services (DoS), spyware, malware, and virus. BANS also enabled multiple computers to collaboratively fight against some distributed intelligent attacks like DDoS. We have implemented the BANS in practice. Some case studies and experimental results exhibited the effectiveness and efficiency of the BANS and the self-defense mechanism.
- Cunningham, R. K., Lippmann, R. P., and Webster, S. E. 2001. Detecting and displaying novel computer attacks with Macroscope. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 31, 4, 275--281. Google Scholar
Digital Library
- Dai, Y. S. 2005. Autonomic computing and reliability improvement. In Proceedings of the 8th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC’05). 204--208. Google Scholar
Digital Library
- Dai, Y. S., Marshall, T., and Guan, X. H. 2006a. Autonomic and dependable computing: Moving towards a model-driven approach. J. Comput. Sci. 2, 6, 496--504.Google Scholar
Cross Ref
- Dai, Y. S., Hinchey, M., Qi, M., and Zou, X. 2006b. Autonomic security and self-protection based on feature recognition with virtual neurons. In Proceedings of the 2nd IEEE Symposium on Dependable, Autonomic and Secure Computing (DASC’06). 227--235. Google Scholar
Digital Library
- Dai, Y. S., Pan, Y., and Zou, X. K. 2007a. A hierarchical modeling and analysis for grid service reliability. IEEE Trans. Comput. 56, 5, 681--691. Google Scholar
Digital Library
- Dai, Y. S., Hinchey, M., and Hu, Q. 2007b. Consequence oriented self-healing and hybrid diagnosis integrating decision diagram, fuzzy logic and neural network. In Proceedings of the 4th IEEE International Workshop on Engineering of Autonomic & Autonomous Systems. 103--112. Google Scholar
Digital Library
- Hamilton, J. D. 1994. Time Series Analysis. Princeton University Press.Google Scholar
- Haykin, S. 1998. Neural Networks: A Comprehensive Foundation. Prentice Hall. Google Scholar
Digital Library
- Hinchey, M., Dai, Y. S., Rouff, C. A., Rash, J. L., and Qi, M. 2007. Modeling for NASA autonomous nanotechnology swarm missions and model-driven autonomic computing. In Proceedings of the 21st IEEE International Conference on Advanced Information Networking and Applications (AINA’07). 250--257. Google Scholar
Digital Library
- Ioannidis, J. and Bellovin, S. M. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of the Network and Distributed System Security Symposium. 1530--1539Google Scholar
- Jin, X., Zhang, Y., Pan Y., and Zhou, Y. 2006. ZSBT: A novel algorithm for tracing DOS attackers in MANETS. EURASIP J. Wireless Commun. Network, 1--9. Google Scholar
Digital Library
- Kephart, J. and Chess, D. 2003. The vision of autonomic computing. Computer 36, 1, 41--50. Google Scholar
Digital Library
- Keromytis, A. D., Misra, V., and Rubenstein, D. 2004. SOS: An architecture for mitigating DDoS attacks. IEEE J. Sel. Areas Commun. 22, 1, 176--188. Google Scholar
Digital Library
- Koshutanski, H. and Massacci, F. 2008. Interactive access control for autonomic systems: From theory to implementation. ACM Trans. Auton. Adapt. Syst. 3, 3, Article No. 9. Google Scholar
Digital Library
- Lilien, L. and Bhargava, B. 2006. A scheme for privacy-preserving data dissemination. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 36, 3, 503--506. Google Scholar
Digital Library
- McLachlan, G. J. 2005. Discriminant Analysis and Statistical Pattern Recognition. John Wiley & Sons.Google Scholar
- Patterson, D. A., Brown, A., Broadwell, P., et al. 2002. Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies. Tech. rep. UCB//CSD-02-1175. Google Scholar
Digital Library
- Russell, L., Chiang, H., and Russell, E. L. 2001. Fault Detection and Diagnosis in Industrial Systems. Springer.Google Scholar
- Xiang, Y. and Zhou, W. 2006. Protecting information infrastructure from DDoS attacks by mark-aided distributed filtering (MADF). Int. J. High Perform. Comput. Networking 4, 5/6, 357--367. Google Scholar
Digital Library
- Xiang, Y., Zhou, W., and Guo, M. 2008. Flexible deterministic packet marking: An IP traceback system to find the real source of attacks. IEEE Trans. Parallel Distrib. Syst. 20, 4, 567--580. Google Scholar
Digital Library
- Yu, S., Zhou, W., and Doss, R. 2008. Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12, 4, 319--321.Google Scholar
- Zhang, S. and Dasgupta, P. 2003. Denying denial-of-service attacks: A router based solution. In Proceedings of the International Conference on Internet Computing. 301--307Google Scholar
- Zhou, W., Xiang, Y., and Guo, M. 2008. Network attacks and defense systems. Computer Syst. Sci. Eng. 23, 3, 137--138.Google Scholar
- Zou, X., Dai, Y. S., and Bertino, E. 2008. A practical and flexible key management mechanism for trusted collaborative computing. In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM’08). 1211--1219.Google Scholar
Index Terms
Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing
Recommendations
Bionic autonomic nervous system and self-healing for NASA ANTS-like missions
SAC '07: Proceedings of the 2007 ACM symposium on Applied computingThe PAM (Prospecting Asteroid Mission) submission of the NASA concept mission ANTS (Autonomous Nano-Technology Swarm) involves the launch of a swarm of 1,000 autonomous pico-class spacecraft that will explore the asteroid belt. I this paper, we describe ...
Toward an Automatic, Online Behavioral Malware Classification System
SASO '13: Proceedings of the 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing SystemsMalware authors are increasingly using specialized toolkits and obfuscation techniques to modify existing malware and avoid detection by traditional antivirus software. The resulting proliferation of obfuscated malware variants poses a challenge to ...
A novel malware for subversion of self-protection in anti-virus
Major anti-virus solutions have introduced a feature known as 'self-protection' so that malware and even users cannot modify or disable the core functionality of their products. In this paper, we have investigated 12 anti-virus products from four ...






Comments