Article Preview
Top1. Introduction
The evolution of computing and communication capabilities has been accompanied with an evolution in security requirements and increasing demands on security mechanisms. In early computing systems, physical controls were an effective means of protecting data and software from unauthorized access because these systems were physically isolated. Multiuser-programming and the connection of computers to networks created a need for mechanisms to control the sharing of data and programs amongst a community of users. The move to distributed systems exacerbated these problems, providing remote access not only for users, but also for attackers from anywhere in the world (Dieter & Raul, 2000).
Biological and social systems of comparable and greater complexity have self-healing processes which are crucial to their survival. It will be necessary to mimic such systems if our future computer systems are to prosper in a complex and hostile environment (Mark, 1998).
Computers and the information they contain are often considered confidential systems because their use is typically restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, computers and computer data can be harmed by people who spread computer viruses and worms. Hackers also violate confidentiality by observing computer monitor screens and by impersonating authorized users of computers in order to gain access to the users’ computers. Security in computer comes in different way: Backup, Encryption, Approved users, passwords, Firewalls, Intrusion detection, Application safeguard, etc. Network security starts from authenticating any user, most likely a username and a password. Once authenticated, a stateful firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component fails to check potentially harmful contents such as computer worms being transmitted over the network. An intrusion prevention system (IPS) helps detect and prevent such malware. IPS also monitors for suspicious network traffic for contents, volume and anomalies to protect the network from attacks such as denial of service. Communication between two hosts using the network could be encrypted to maintain privacy. Individual events occurring on the network could be tracked for audit purposes and for a later high level analysis (Wikipedia, 2007).
The biological immune system has been successful at protecting the human body against a vast variety of foreign pathogens. A growing number of computer scientists have carefully studied the success of this competent natural mechanism and proposed computer immune models for solving various problems including fault diagnosis, virus detection, and mortgage fraud detection (Jungwon & Bentley, 1999).
1.1 Biology Security
Cell (biology), is the basic unit of life. Cells are the smallest structures capable of basic life processes, such as taking in nutrients, expelling waste, and for reproduction. All living things are composed of cells. Some microscopic organisms, such as bacteria and protozoa, are unicellular, meaning they consist of a single cell. Plants, animals, and fungi are multicellular; that is, they are composed of many cells working in concert. But whether it makes up an entire bacterium or is just one of trillions in a human being, the cell is a marvel of design and efficiency. Cells carry out thousands of biochemical reactions each minute and reproduce new cells that perpetuate life.