Introduction
Recognition of the Immune System
Generating Receptor Diversity
Affinity Maturation
Oraganizing Principles
Possible Architectures
Artficial Immune System
Summary



Organizing Principles

Distributability

Lymphocytes in the immune system are able to determine locally the presence of an infection. No central coordination takes place, which means there is no single point of failure. Thus, the concept of distributed architecture should be emphasized.

Multi-layered

In the immune system, no one mechanism confers complete security. Rather. Multiple layers of different mechanisms are combined to provide high overall security. This too is not a new concept in computer security, but it is important and should be emphasized in system design.

Diversity

By making systems diverse, security vulnerabilities in one system are less likely to be widespread. There are two ways in which systems can be diverse: the protection systems can be unique ( as in natural immune system) or the protected systems can be diversified.

Disposability

No single component of human immune system is essential that is any cell can be replaced. The immune system can manage this because cell death is balanced by cell production. Although we do not currently have self-reproducing hardware, death and reproduction at the process/agent level is certainly possible and would have some advantages if it could be controlled.

Autonomy

The immune system does require outside management or maintenance; it autonomously classifies and eliminates pathogens and it repairs itself by replacing damaged cells. Although we do not expect (or necessarily want) such degree of independence from our computers, as networks and CPU speeds increase, and as the use of mobile code spreads, it will be increasingly important fro computers to manage most security problems automatically.

Adaptability

The immune system learns to detect new pathogens and retains the ability to recognize previously seen pathogens through immune memory. A computer immune system should be similarly adaptable, both learning to recognize new intrusions and remembering the signatures of previous attacks.

No secure Layer

Any cell in the human body can be attacked by a pathogen including those of immune system itself. However, because lymphocytes are also cells lymphocytes can protect the body against other compromised lymphocytes. In this way, mutual protection can stand in for a secure code base.

Dynamically changing coverage

The immune system makes a space/time trade off in its detector set; it cannot maintain a set of detectors (lymphocytes) large enough to cover the space of all pathogens, so instead at any time it maintains a random sample of its detector repertoire, which circulates throughout the body. This repertoire is constantly changing through cell death and reproduction.

Identity via behavior

In cryptography identity is proven through the use of a secret. The human immune system, in contrast, does not depend on secrets; instead, identity is verified through the presentation of protein fragments. Because proteins can be thought of as ? the running code? of the body, peptides serve as indicators of behavior. This can be implemented as short sequences of system calls in computer immune system.

Anomaly detection

The immune system that has the ability to detect pathogens that it has never encountered before that is it performs anomaly detection. This ability to detect intrusions or violation that are not already known is an important feature of any security system.

Numbers game

The human immune system replicates detectors to deal with replicating pathogens. It must do so otherwise the pathogens would quickly overwhelm any defense. Computers are subject to a similar numbers game, by hackers freely trading exploit scripts on the Internet, by denial of service attacks and by computer viruses. For example: success of one hacker can quickly lead to the compromise of thousands of hosts. Clearly the pathogens in the computer security world are playing the numbers game.

NEXT: Possible Architectures