1st International ICST Conference on Bio Inspired Models of Network, Information and Computing Systems

Research Article

Bio-inspired promoters and inhibitors for self-organized network security facilities

  • @INPROCEEDINGS{10.1145/1315843.1315874,
        author={Falko  Dressler},
        title={Bio-inspired promoters and inhibitors for self-organized network security facilities},
        proceedings={1st International ICST Conference on Bio Inspired Models of Network, Information and Computing Systems},
        publisher={ACM},
        proceedings_a={BIONETICS},
        year={2006},
        month={12},
        keywords={},
        doi={10.1145/1315843.1315874}
    }
    
  • Falko Dressler
    Year: 2006
    Bio-inspired promoters and inhibitors for self-organized network security facilities
    BIONETICS
    ACM
    DOI: 10.1145/1315843.1315874
Falko Dressler1,*
  • 1: Dept. of Computer Sciences, University of Erlangen, Germany
*Contact email: dressler@informatik.uni-erlangen.de

Abstract

Self-organization techniques based on promoters and inhibitors has been intensively studied in biological systems. Promoters enable an on-demand amplification of reactions to a particular cause. This allows to react quickly with appropriate countermeasures. On the other hand, inhibitors are capable of regulating this uncontrolled amplification by suppressing the reaction. In this paper, we demonstrate the applicability of these mechanisms in a network security scenario consisting of network monitoring elements, attack detection, and firewall devices. Previous work identified most existing detection approaches as not suitable for high-speed networks. This problem can be alleviated by separating the methodologies for network monitoring and for subsequent data analysis. In this paper, we present an adaptation algorithm that allows to manage the individual configuration parameters in order to optimize the overall system. We show the advantages of self-regulating techniques based on promoters and inhibitors that lead to maximized security and that gracefully degradate in case of overload situations. We created a simulation model to verify the algorithms. The results of the conducted simulations encourage further studies in this field.