Abstract
Although systems engineers have developed powerful tools for measuring, modeling, and optimizing system performance, system security is much less well understood. This paper discusses the issue of system security in the context of Internet security and introduces a simple idea called ProgramID. ProgramID is an example of a strategy based on a principle we call think globally, act locally (TGAL), a general principle for distributed, decentralized management of networks. Under the TGAL principle, a combination of simple security strategies acting at a local level can produce measurable increases in global security. ProgramID can be implemented via a simple service that users can add to their operating system to force programs to identify themselves before they can execute. This gives individual computer users an extra layer of protection against malicious programs such as the increasingly prevalent email viruses. Using epidemic-like models, we analyze how global security is impacted when some fraction of Internet users have ProgramID protection.
Similar content being viewed by others
References
Bontchev, V. Are “Good” computer viruses still a bad idea. http://securityresponse.symantec.com/
Clark, D. The design philosophy of the DARPA internet protocols. Proceedings of ACM SIGCOMM 1988, Stanford, CA, August 1988, vol. 18 No. 4. http://www.acm.org/sigcomm/ccr/archive/1995/jan95/ccr-9501-clark.html
Ho, Y.-C., and Pepyne, D. L. A conceptual framework for optimization and distributed intelligence. To appear Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004.
Ivanov, I. Detecting Windows NT/2K process execution. http://www.codeproject.com/threads/procmon.asp
Newman, M. E. J., and Watts, D. J. 1999. Scaling and percolation in the small world network model. Physical Review E 60: 7332–7342.
Pfleeger, C. P., and Pfleeger, S. H. 2003. Security in Computing, 3rd edition. Prentice Hall.
Watts, D. J., and Strogatz, S. H. 1998. Collective dynamics of small world networks. Nature 393: 440–442.
White, G. B., Fisch, E. A., and Pooch, U. W. 1996. Computer System and Network Security. CRC Press.
Rights and permissions
About this article
Cite this article
Ho, YC., Pepyne, D.L., Zhao, Q. et al. ProgramID. Discrete Event Dynamic Systems 14, 381–393 (2004). https://doi.org/10.1023/B:DISC.0000039786.13745.c7
Issue Date:
DOI: https://doi.org/10.1023/B:DISC.0000039786.13745.c7