The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2011 vol.9)
pp: 14-23
Lee Hively , Oak Ridge National Laboratory
Frederick Sheldon , Oak Ridge National Laboratory
Anna Cinzia Squicciarini , Pennsylvania State University
ABSTRACT
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in "Maginot Line" defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.
INDEX TERMS
trustworthy computing, scalability, security, nature-inspired cybersecurity, cyber crime
CITATION
Lee Hively, Frederick Sheldon, Anna Cinzia Squicciarini, "Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor", IEEE Security & Privacy, vol.9, no. 4, pp. 14-23, July-Aug. 2011, doi:10.1109/MSP.2010.142
REFERENCES
1. President's Information Technology Advisory Committee, Cyber Security: A Crisis of Prioritization, US Nat'l Coordination Office for Information Technology Research and Development, Feb. 2005; www.nitrd.gov/pitac/reports/20050301_cybersecurity cybersecurity.pdf.
2. Inter-agency Working Group on Cyber Security and Information Assurance, Federal Plan for Cyber Security and Information Assurance Research and Development, US Nat'l Science and Technology Council, Apr. 2006; www.nitrd.gov/pubs/csiacsia_federal_plan.pdf .
3. Roadmap for Cybersecurity Research, US Dept. of Homeland Security, Jan. 2009; www.cyber.st.dhs.gov/docsDHS-Cybersecurity-Roadmap.pdf .
4. National Cyber Leap Year Summit 2009 Co-chairs' Report, Networking and Information Technology Research and Development (NITRD), 16 Sept. 2009; www.qinetiq-na.com/Collateral/Documents/ English-US/InTheNews_docsNational_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf .
5. Michael Näf, "Ubiquitous Insecurity? How to 'Hack' IT Systems," Information & Security, vol. 7, 2001, pp. 104–118.
6. "The Digital Universe Is Still Growing," EMC Corp., 2011; www.emc.com/leadership/digital-universeexpanding-digital-universe.htm .
7. G.V. Hulme, "If Stuxnet Was Act of Cyberwar, Is U.S. Ready for a Response?" Computerworld,3 Mar. 2011.
8. J. Hawkins and S. Blakeslee, On Intelligence, Henry Holt, 2004.
9. R.Q. Quiroga et al., "Invariant Visual Representation by Single Neurons in the Human Brain," Nature,23 June 2005, pp. 1102–1107.
10. D. Dasgupta and F. Nino, Immunological Computation: Theory and Application, CRC Press, 2008.
11. T. Daly and L. Burns, "Concordia: Google for Malware," Proc. 6th Ann. Workshop Cyber Security and Information Intelligence Research, ACM Press, 2011, article 30; http://daly.axiom-developer.org/TimothyDaly_files/ publications/sei/CSIIRW10concordiaSheldon.pdf .
12. "Gator Blood Destroys Deadly Superbugs," Scientific Computing, 2011; www.scimag.comGator_Blood_Destroys_Deadly_Superbugs.aspx?terms=alligator .
37 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool