Symbiotes and defensive Mutualism: Moving Target Defense
نویسندگان
چکیده
If we wish to break the continual cycle of patching and replacing our core monoculture systems to defend against attacker evasion tactics, we must redesign the way systems are deployed so that the attacker can no longer glean the information about one system that allows attacking any other like system. Hence, a new poly-culture architecture that provides complete uniqueness for each distinct device would thwart many remote attacks (except perhaps for insider attacks). We believe a new security paradigm based on perpetual mutation and diversity, driven by symbiotic defensive mutualism can fundamentally change the ‘cat and mouse’ dynamic which has impeded the development of truly effective security mechanism to date. We propose this new ‘clean slate design’ principle and conjecture that this defensive strategy can also be applied to legacy systems widely deployed today. Fundamentally, the technique diversifies the defensive system of the protected host system thwarting attacks against defenses commonly executed by modern malware.
منابع مشابه
Antibiotic-producing symbionts dynamically transition between plant pathogenicity and insect-defensive mutualism
Pathogenic and mutualistic bacteria associated with eukaryotic hosts often lack distinctive genomic features, suggesting regular transitions between these lifestyles. Here we present evidence supporting a dynamic transition from plant pathogenicity to insect-defensive mutualism in symbiotic Burkholderia gladioli bacteria. In a group of herbivorous beetles, these symbionts protect the vulnerable...
متن کاملAnt mimicry by Passiflora flowers?
Mutualism between plants and the ants that defend them from herbivory is a well-known phenomenon. Because of ant aggression, ant mimicry as a defense against predation is very common in the animal kingdom, and has already been suggested as a type of visual anti-herbivory defensive coloration in leaves and stems of several plant species. Many Passiflora species have dark dots and short stripes o...
متن کاملDefending Embedded Systems with Software Symbiotes
A large number of embedded devices on the internet, such as routers and VOIP phones, are typically ripe for exploitation. Little to no defensive technology, such as AV scanners or IDS’s, are available to protect these devices. We propose a host-based defense mechanism, which we call Symbiotic Embedded Machines (SEM), that is specifically designed to inject intrusion detection functionality into...
متن کاملBalancing anti-herbivore benefits and anti-pollinator costs of defensive mutualists
Quantifying costs and benefits of ostensibly mutualistic interactions is an important step toward understanding their evolutionary trajectories. In food-for-protection interactions between ants and extrafloral nectar (EFN)-bearing plants, tending by aggressive ants may deter herbivores, but it may also deter pollinators. The fitness costs of pollinator deterrence are not straightforward for lon...
متن کاملBasic and legal analysis of the justification or non-justification of killing in defense of property
Justifying or not justifying killing in defense of property has always been a challenging issue for jurists Western jurists have studied such killing in the light of the principle of proportionalit. . That is,whether there is a balance and proportionality between defensive action - killing aggressor- and aggressive action - attacking property – or not. based on this principle, some believe that...
متن کامل