2010
DOI: 10.1007/978-3-642-14412-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Self-organisation for Survival in Complex Computer Architectures

Abstract: Abstract. This chapter steps back from specific self-organisational architectural solutions to consider what self-organisation means in the context of complex systems. Drawing on insights in complexity and selforganisation, the chapter explores how the natural propensity of complex systems (such as the mammalian immune system) to self-organise could be exploited as a mechanism for adaptation in complex computer architectures. Drawing on experience of immune-inspired fault-tolerant swarm robotics, the chapter s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Attacks that try to exploit the weakness that leads to access to the system and various resources can be referred to as Subvert Access Control attacks. An example of such attacks include unauthorized access to privacy information (Veledar et al, 2019), personation (Polack, 2010) and man in the middle (Settanni et al, 2018b) attacks.…”
Section: Attack Mechanismsmentioning
confidence: 99%
See 3 more Smart Citations
“…Attacks that try to exploit the weakness that leads to access to the system and various resources can be referred to as Subvert Access Control attacks. An example of such attacks include unauthorized access to privacy information (Veledar et al, 2019), personation (Polack, 2010) and man in the middle (Settanni et al, 2018b) attacks.…”
Section: Attack Mechanismsmentioning
confidence: 99%
“…These were investigated and classified according to the Mechanisms of Attack: CAPEC-1000, which resulted in the following mapping of categories and specific attacks: Manipulate System Resources (56), Engage in Deceptive Interactions (34), and Inject Unexpected Items (20), Subvert Access Control (8), Collect and Analyze Information (6), and Abuse Existing Functionality (2). In regards to the specific attacks, these include sensor degradation (Yoon et al, 2017), GPS jamming (Petit and Shladover, 2015), message replay (Liu et al, 2017), sensor and camera spoofing (Le and Maple, 2019), sound interference (Petit and Shladover, 2015), invisible object (Petit and Shladover, 2015), message falsification (Amoozadeh et al, 2015), fault injection (Zhu et al, 2020), miss-report (Liu et al, 2017) attacks, unauthorized access to privacy information (Veledar et al, 2019), personation (Polack, 2010), man in the middle (Settanni et al, 2018b), location tracking (Petit and Shladover, 2015), information disclosure (Monteuuis et al, 2018), eavesdropping sensors (Petit and Shladover, 2015), side-channel (Yoon et al, 2017), and blocking pseudonym change (Petit and Shladover, 2015) attacks. The aforementioned attacks are in most cases executed remotely targeting each property of the CIA triad with a focus on sensors and controller of a self-adaptive system.…”
Section: Answer To Rq1mentioning
confidence: 99%
See 2 more Smart Citations
“…Need for Unconventional Approaches to Cyber Security The motivation for seeking inspiration from other systems is necessary due to the observation that cyberspace and inherently cyber security environments are complex. In other fields, for instance robotics, analogies to the immune system are exploited to design selforganisation mechanisms[12]. Biological concepts have been central and contributed to robust implementations in a range of domains including computing, financial modelling…”
mentioning
confidence: 99%