You are on page 1of 3

2008 International Conference on Internet Computing in Science and Engineering

Survivable Network System: An Immune Approach


Huiqiang Wang1, Guosheng Zhao1, 2, and Jian Wang1
1
School of Computer Science and Technology, Harbin Engineering University, 150001 Harbin, China
2
Center of Computer Network and Information, Harbin Normal University, 150001 Harbin, China
E-Mail: zhaoguosheng@hrbeu.edu.cn

Abstract system based on immunity principle becomes an


interesting problem and has important research
Survivability has emerged as a new phase for the significance and value.
development of network security technique, but an
accepted analysis and construction method is still lacking 2. Theory of biological immunity
for it. This paper presents the similarity between
biological immunity system and survivable network We use the non-precise biological language to descript
system, and also provides a kind of new and feasible idea work principle of biology immunity system
for designing and implementing survivable network approximately, mainly withdrawing its basic thought, in
system. order to use for the design of survivable network system.
The immune system defends the body against harmful
1. Introduction diseases and infections. It is capable of recognizing
virtually any foreign cell or molecule and eliminating it
Network survivability breaks limits of traditional from the body. To do this, it must perform pattern
network security concepts, and emphasizes the abilities of recognition tasks to distinguish molecules and cells of
network and information systems to achieve their main body from foreign ones.
missions in a timely manner, while they are suffering The architecture of immune system is multilayered,
from attacks, faults, or accidents [1]. Most researches on which defenses provided at many levels. Once pathogens
survivability early begin with the military domain [2]. have entered body, they are handled by innate immune
With the increasing frequency of safe destruction, system and by adaptive immune response. The innate
survivability has been paid more and more attentions and immune system consists primarily of circulating
becomes the hot spot of current network security domain. scavenger cells that ingest extra cellular molecules and
But the research on survivability is still at the initial stage, materials, clearing the system of both debris and
at present has not formed perfect and mature theory pathogens. Adaptive immune response is the most
system and lacks unified criterion. It is still a puzzle for sophisticated and involves many different types of cells
analysis and construction of a survivable network system. and molecules. It is called “adaptive” because it is
The nature organism's immunity characteristic gives us responsible for immunity that is adaptively acquired
a very good model when we solve the question of network during the lifetime of the organism. Because the adaptive
survivability. There exist various pathogens and viruses, immune system provides the most potential from network
which start attacks and invasions to humanity's organism survivability viewpoint, we will focus on it in this
continually, but human body has resisted and overview. More exhaustive description about biological
disintegrated about 90% above attacks and invasions immune system may see literature [3].
because of immunity. As a result, the pathogens and
viruses that truly enter into everybody body interior are 3. Survivable network system
not to 10%. That is to say, the biological immunity system
has very strongly protective function, and it will have 3.1. Characteristics
broad application prospect if we design survivable
network system using the biological immunity principle Critical characteristic of survivability is that the
for reference. systems can achieve their essential services when faces
We should pay attention to how the network system the attack, failure and accident. While completes essential
enables to automatically discover system leaks used by services, the system should still maintain its basic
attacks, and simultaneously independently eliminate attributes, such as data integrality, confidentiality etc. In
invasions, even repair these leaks after attack appears order to ensure the ability of achieving essential services,
based on the biological immunity principle. Because of the survivable network system must have four critical
the similarity between network system and biological attributes [4], namely resistance, recognition, recovery,
system on mechanisms, establishing survivable network

978-0-7695-3112-0/08 $25.00 © 2008 IEEE 329


DOI 10.1109/ICICSE.2008.86

Authorized licensed use limited to: K.S. Institute of Technology. Downloaded on February 15,2010 at 19:08:09 EST from IEEE Xplore. Restrictions apply.
and self-adaptation and evolvement, which are manifested (2)Multi-layered: In immune system, no one
and guaranteed through making corresponding strategies. mechanism confers complete survivability. Rather,
Resistance carries on prevention of attacks as far as multiple layers of different mechanisms are combined to
possible through various technologies; But there always provide high overall survivability. This is not a new
exist part of attacks to be able to permeate each kind of concept in network survivability, but we believe it is
defense measure with development of attack technologies, important and should be emphasized in system design.
therefore the system must have a certain ability of (3)Diversity: By making systems diverse, survivability
recognition attacks; If the occurred attacks have already vulnerabilities in one system are less likely to be
made influence to system, we must take effective widespread. There are two ways in which systems can be
measures to recover the system and services timely; diverse: the protection systems can be unique or the
Finally system should also have abilities of self- protected systems can be diversified.
adaptation and evolvement, which can make the system (4)Disposability: No single component of the human
carry on resistance and recognition for new and varietals immune system is essential—that is, any cell can be
attacks, thus ensure survivability for network system replaced. Immune system can manage this because cell
effectively. death is balanced by cell production. Although we do not
currently have self-reproducing hardware, death and
3.2. Implement of survivable network system reproduction at the process level is certainly possible and
would have some advantages if it could be controlled.
At present, implement of survivability is mainly (5)Autonomy: The immune system does not require
focused on unofficial applications, and we have not outside management or maintenance; it autonomously
discovered realization examples for network survivability classifies and eliminates pathogens, and it repairs itself by
based on practical applications. The emergent algorithm replacing damaged cells. Although we do not expect (or
proposed by CERT/CC research center is used to solve necessarily want) such a degree of independence from our
survivability questions of boundless system. It regards the computers, as network and CPU speeds increase, and as
survivability requirement and other holistic non- the use of mobile code spreads, it will be increasingly
functional attributes such as security as the systematic important for computers to manage most security
emergent attributes, fully uses the characteristics of problems automatically.
boundless system, produces and maintains emergent (6)Adaptability: The immune system learns to detect
attributes through cooperation of system nodes to ensure new pathogens, and retains the ability to recognize
system survivability. But the emergent algorithm is previously seen pathogens through immune memory. A
merely a development idea for realization of survivability, computer immune system should be similarly adaptable,
demanding implement on concrete applications. both learning to recognize new intrusions and
Now, technologies used for developing survivable remembering the signatures of previous attacks.
system mainly include: self-adaptation and (7)Dynamically changing coverage: Immune system
reconfiguration, diversity and redundancy, real-time makes a space/time tradeoff in its detector set: it cannot
invasion monitoring, detection and response, intrusion maintain a set of detectors (lymphocytes) large enough to
tolerance, acceptable performance reducing, access cover the space of all pathogens, so instead at any time it
control, isolation control and so on. maintains a random sample of its detector repertoire,
which circulates throughout the body. This repertoire is
constantly changing through cell death and reproduction.
4. Survivable network systems based on an (8)Anomaly detection: Immune system has an ability
Immune Approach to detect pathogens that it has never encountered before,
i.e. it performs anomaly detection. We believe that the
4.1. Organizing principles ability to detect intrusions or violations is an important
feature of any survivable system.
In spite of there are several fundamental differences (9)Imperfect detection: By accepting imperfect
between the biology and network systems, a study of detection, the immune system increases the flexibility
immune system reveals a useful set of organizing with which it can allocate resources. For example, less
principles that we believe should guide the design of specific lymphocytes can detect a wider variety of
survivable network systems: pathogens but will be less efficient at detecting any
(1)Disreputability: Lymphocytes in the immune specific pathogen.
system are able to determine locally the presence of an (10)The numbers game: Human immune system
infection, and no central coordination takes place. The replicates detectors to deal with replicating pathogens. It
human immune system provides a good example of a must do so—otherwise, the pathogens would quickly
highly distributed architecture that greatly enhances overwhelm any defense. Computers are subject to a
robustness. similar numbers game, by hackers freely trading exploit

330

Authorized licensed use limited to: K.S. Institute of Technology. Downloaded on February 15,2010 at 19:08:09 EST from IEEE Xplore. Restrictions apply.
scripts on the Internet, by denial-of-service attacks, and information; the overall dynamic behavior of the system
by computer viruses. For example, success of one hacker is driven by detection module.
can quickly lead to compromise of thousands of hosts. (3)Adaptation module: studies and recognizes new
Clearly, the pathogens in network survivability world are attacks in the system, and automatically produce the patch
playing the numbers game—traditional systems, however, procedure or attack signature used for filtering this kind
are not. of new attack and its simple variety, thus enhances
These properties can be thought of as design principles flexibility of the system.
for a survivable network system. Many of them are not (4)Executive module: concrete execution unit of
new, and some have been integral features of survivable response and repair strategy, including recovery of
network systems; however, no existing survivable control, block, elimination and its influence against
network system incorporates more than a few of these attacks.
ideas. Although the exact biological implementation may (5)Recovery module: Restores services which are
or may not prove useful, we believe that these properties damaged in the system, and it belongs to a part of
of natural immune systems can help us design more response.
survivable network systems. (6)Response and repair module: produces response and
repair strategy with attack and system state information.
4.2. Design for survivable network system (7)Coordination control module: coordinates each unit
in the system, and guarantees each kind of mechanism
One approach to design survivable network system effective coordination.
that incorporate the principles discussed in the previous
section is to design systems based on direct mappings 5. Conclusions
between immune system components and current network
system architectures. The function mapping between the Because the similarity between biological immunity
biological immunity system and the survivable network system and survivable network system, as well as the
system is showed in Table 1. immunity system’s characteristics which are displayed in
process of information disposal such as distributional
Tabel 1. The function mapping protection, self-adaptation, haleness, easy expansibility,
Immune fault-tolerant and abnormity detection etc., we proposed a
Survivable network system
system novel conception that construct the survivable network
Isolate and Block the attacks towards system by firewall, system using the biological immunity principle. Although
restrain encryption etc.; provide the network at present actually constructing such a survivable network
pathogen environment not suitable for certain attacks
Detect attacks,intrusions,damage of services
system in this way exist some problems, it is extremely
Detect effective through the analysis in section 4, which can
by intrusion detection, virus detection,QoS
pathogen solve many questions for constructing a survivable
monitoring etc.
Control influence scope of attacks by various network system and is a very significant research
Restrain
measures, prevent the attack spreads in the direction.
infection
overall system
Verify the alarm information sent out by some
Cooperated
detection units (e.g. abnormity detection), 6. References
stimulate
eliminates mistaken reports
Adaptation Study, recognize unknown attacks [1] R.Westmark. A Definition for Information System
Immune Recognize and abstract unknown attack Survivability. The 37th Hawaii Internal Conference
memory signature by study for unknown attacks on Systern Sciences (HICSS'04), IEEE, 2004,
Eliminate Block, eliminate the attacks detected by pp.2086-2096.
pathogen system [2] T.Z.Jiang. A New Definition of Survivability of
Recover the damaged services by restarting Communication Networks. Military
Regeneration
the service programming or restoring to a
(recovery) Communications Conference: Military
checkpoint established in advance
Communication in a Changing World, IEEE, 1999,
pp.2007-2012.
Various functions showed in Table 1 correspond to
[3] C.A.Janeway, P.Travers. Immunobioloy: The
concrete modules structure. There exist 7 modules in the
Immune System in Health and Disease (the 3rd
system structure, and we will illuminate as follows.
Edition). London: Current Biology Ltd., 1996.
(1)Resistance module: isolates attack from the network
[4] R. Ellison, D.A.Fisher. Survivable Network Systems:
system through establishing barrier, which has coped with
An Emerging Discipline. http://www.sei.cmu
the most attacks.
/nublications/dcuments, 1999.
(2)Detection module: detects attack behavior, damage
of services against the system, and sends out alarm

331

Authorized licensed use limited to: K.S. Institute of Technology. Downloaded on February 15,2010 at 19:08:09 EST from IEEE Xplore. Restrictions apply.

You might also like