Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks by dana-edwards

View this thread on steempeak.com
· @dana-edwards · (edited)
$1,522.96
Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks
Introduction
============
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/thumb/9/97/NetworkTopology-Mesh.svg/2000px-NetworkTopology-Mesh.svg.png)
Today we will examine the concept of the artificial immune system. In one of my previous blog posts I discussed biomimicry and how it relates to information security. We will revisit biomimicry in the form of artificial immune systems. I will reveal how DTNs (disruption tolerant network/delay tolerant networks) function and how they may be used to improve security in the Internet of Things. I will discuss a new whitepaper for an in development decentralized application called IOTA which utilizes DAGs. And finally I will combine all of these different technologies into an example of how it might in the near future converge to be used.
https://youtu.be/u2qRUtg2k3Y

>“The thesis presents nine design principles for the 
second generation’s artificial immune systems. The first 
principle is that artificial immune systems are represented 
as autonomous agents. The second principle states 
problems when AIS are represented as antigens or 
external (intrusion) signals. The third principle states that 
the aim of the second generation AIS is to maintain 
themselves and their environments. The fourth principle 
defines the functions of agents being to capture antigens, 
to process, to present, to recognize, to monitor, process 
and produce signals [4]. The fifth design principle states 
that agents have a life cycle. The sixth design principle 
states that agents communicate with the environment at 
multiple levels. The seventh design principle states that 
signals can be externally or internally produced. The eight 
design principle states that receptors can be specific, 
internal or external signals. Te last principle states that 
agents can specialize in specific tasks “  (Singh, 2015).

Using artificial immune systems for intrusion detection
=======================================================
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/8/81/Network_based_intrusion_detection_system.png)
The design principles above show that you can represent an artificial immune system as autonomous agents. In the human body homeostasis must be maintained, and similarly in a network the equivalent of homeostasis must be maintained. Artificial immune systems in the context of network security can be used to detect an anomaly or intrusion (IDS) and then respond to the anomoly or intrusion (IRS). Just like with an immune system in the human body, when an intrusion is detected, then in real time the intrusion response system is activated, and from there an immune sequence takes place to neutralize the threat. In order to follow the architecture illustrated in Singh's paper, it would require a sensor network of secure autonomous agents, which are given the task of performing vulnerability analysis, intrusion detection, incident response and security management.

What are delay tolerant networking / disruption tolerant networks?
==================================================================
![enter image description here](https://upload.wikimedia.org/wikipedia/commons/4/4c/Leaky_bucket_as_a_meter-policing.JPG)
To provide clarity, depending on which circle you are in you may have heard DTNs referred to as either delay tolerant networks or disruption tolerant networks. Both of these different acronyms are equivalent in how they function, but disruption tolerant networking is favored by DARPA and connected groups.

**Video example**: https://www.youtube.com/watch?v=nWtRTzXJvtI

Disruption tolerant networking was developed for use in space and in military situations where connectivity might vary due to certain conditions, but where the delivery of the message is critical in spite of the fact that connectivity patterns vary. Ad-hoc mobile networks can benefit from a DTN, and these ad-hoc mobile networks can be incredibly resilient as they (the nodes) can be made up of drones, wearable computers, vehicles, all which may constantly be in motion, which have payloads which must wait until a peer is found which is capable of receiving it.

DTNs will be increasingly relevent in the Internet of Things era of computing because MANET (mobile ad-hock networks) and VANETs (vehicle ad-hock networks), will be among the “things” in the IoT.

What is Iota and why is it relevant?
====================================

Iota is a design for a micropayment platform. At this time it is unknown whether it will be a success, but from what is known about the project, it uses a DAG (directed acyclic graph) to allow for micropayments without a global blockchain. DAGs (directed acyclic graphs) are used to allow for the transmission of value over the Internet of Things. Iota uses a braid like structure but does not create a tree like structure and in doing this it doesn't require as much resources.

A graph can represent the nodes within an ad-hock network. The DAG can produce a casual graph which can function as an immutable history of the relationships between the nodes. In the case of transactions it may be possible to use a DAG to secure transactions by utilizing “cumulative weights” (Popov, 2015). It must be noted that Iota has not been tested and what is currently presented is theoretical rather than a practical empirical result.

What could we do with these technologies in combination?
============================================

Combining DTN, Iota and the artificial immune system approach to secrurity may produce some intriguing results. DTNs are incredibly resilient, useful for mobile networks within a city, and are useful for building ad-hock networks from which to utilize an IoT. Iota with it's experimental micropayments platform could allow for secure payments so that all mobile nodes in the ad-hock network can transmit value to pay a toll for information storage and transmission. The artificial immune system if developed properly could be used to prevent various connected components from being hacked, such as components in a vehicle or inter-connected gadgets. In the case where there is an anonmoly or an intrusion of any of the lesser components in the network, then greater components in the network could theoretically develop an immunity in realtime to contain the threat.


References


Cochran, T. O. (2015). Immunology Inspired Detection of Data Theft from Autonomous Network Activity.

Popov, S. (n.d.). The tangle. Retrieved November 24, 2015, from http://188.138.57.93/tangle.pdf 

Singh, A. (2015). Incorporation of Human Resistant System and Network Security System to improve Computer Security.


If you like this article, check out of my other posts
=====================================================

 - [Ciphertext Policy Attribute Based Encryption, Smart Contracts and Curiosume](https://steemit.com/crypto-news/@dana-edwards/ciphertext-policy-attribute-based-encryption-smart-contracts-and-curiosume)   
 - [Weird machines - unexpected behavior from unexpected (crafted) inputs](https://steemit.com/security/@dana-edwards/weird-machines-unexpected-behavior-from-unexpected-crafted-inputs)  
 - [Attack Tolerant Information Systems](https://steemit.com/tauchain/@dana-edwards/attack-tolerant-information-systems)  
 - [Abstract Interpretation and how to write secure software](https://steemit.com/security/@dana-edwards/abstract-interpretation-and-how-to-write-secure-software)  
 - [Enhanced information security through bioimicry?](https://steemit.com/security/@dana-edwards/enhanced-information-security-through-bioimicry) 
 - [Hardware trojans and the threat of covert channels in software.](https://steemit.com/security/@dana-edwards/hardware-trojans-and-the-threat-of-covert-channels-in-software)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 84 others
👎  
properties (23)
post_id363,006
authordana-edwards
permlinkartificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks
categorysecurity
json_metadata"{"links": ["https://youtu.be/u2qRUtg2k3Y"], "tags": ["security", "crypto-news", "steemit", "truecrypto", "dana-edwards"]}"
created2016-07-30 22:55:00
last_update2016-07-30 23:10:18
depth0
children26
net_rshares63,088,534,355,294
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value1,391.952 SBD
curator_payout_value131.010 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length7,808
author_reputation348,515,599,824,762
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (149)
@isaac.asimov ·
$0.68
Flesch Kincaid Grade Level
Hi! This post has a <a href="https://en.wikipedia.org/wiki/Flesch%E2%80%93Kincaid_readability_tests">Flesch-Kincaid</a> grade level of 13.9 and reading ease of 30%. This puts the writing level on par with academic journals.
👍  , ,
👎  ,
properties (23)
post_id363,009
authorisaac.asimov
permlinkre-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t225503
categorysecurity
json_metadata{}
created2016-07-30 22:55:06
last_update2016-07-30 22:55:06
depth1
children6
net_rshares422,600,256,513
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.664 SBD
curator_payout_value0.016 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length223
author_reputation-982,250,417,825
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (5)
@dana-edwards ·
$4.62
Voted up because this bot provides useful information to help me improve readability of my future blogposts.
👍  , ,
properties (23)
post_id363,054
authordana-edwards
permlinkre-isaacasimov-re-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t225503-20160730t225709981z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 22:57:09
last_update2016-07-30 22:57:09
depth2
children5
net_rshares2,080,489,153,232
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value4.518 SBD
curator_payout_value0.105 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length108
author_reputation348,515,599,824,762
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (3)
@ben99 ·
lol it's the same on all posts
👍  
properties (23)
post_id363,180
authorben99
permlinkre-dana-edwards-re-isaacasimov-re-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t225503-20160730t230509657z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:05:03
last_update2016-07-30 23:05:03
depth3
children3
net_rshares76,959,205
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length30
author_reputation2,454,708,915,685
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@piranhax · (edited)
Hi, I'm a bot you must be a rocket scientist. Because your post sends me to the moon. Your writing style indicates a genius with an I.Q. over 250+, with a happy life. Your command of English grammar also shows you will be a very wealthy, successful, and cherished asset of Steemit. ;)  lol  Great post, upvoted
👍  
properties (23)
post_id363,266
authorpiranhax
permlinkre-dana-edwards-re-isaacasimov-re-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t225503-20160730t231031250z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:10:30
last_update2016-07-30 23:18:12
depth3
children0
net_rshares5,938,416,446
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length310
author_reputation1,007,704,814,136
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@daysaiyan ·
Upvoted
👎  
properties (23)
post_id363,018
authordaysaiyan
permlinkartificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks
categorysecurity
json_metadata{}
created2016-07-30 22:55:39
last_update2016-07-30 22:55:39
depth1
children0
net_rshares-5,652,852
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length7
author_reputation-593,380,586,275
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@ben99 ·
I really try to read but I didn't understand any thing
👍  
properties (23)
post_id363,077
authorben99
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t225809633z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 22:58:03
last_update2016-07-30 22:58:03
depth1
children5
net_rshares136,080,108
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length54
author_reputation2,454,708,915,685
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@stellabelle ·
ha ha! Hilarious confession.
properties (22)
post_id363,113
authorstellabelle
permlinkre-ben99-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t230009759z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:00:09
last_update2016-07-30 23:00:09
depth2
children1
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length28
author_reputation436,515,832,240,166
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@ben99 ·
I'm just honest guy @stellabelle
properties (22)
post_id363,200
authorben99
permlinkre-stellabelle-re-ben99-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t230636665z
categorysecurity
json_metadata"{"users": ["stellabelle"], "tags": ["security"]}"
created2016-07-30 23:06:30
last_update2016-07-30 23:06:30
depth3
children0
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length32
author_reputation2,454,708,915,685
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@dana-edwards ·
Sorry, it's not geared toward the general audience but more for people deeply interested in information security and new technologies like Iota. It's also cutting edge because it cites academic literature which is not well known even among some information security experts.
properties (22)
post_id363,119
authordana-edwards
permlinkre-ben99-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t230025637z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:00:24
last_update2016-07-30 23:00:24
depth2
children2
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length274
author_reputation348,515,599,824,762
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@ben99 ·
now I understand what you say, thank you for explaining
properties (22)
post_id363,186
authorben99
permlinkre-dana-edwards-re-ben99-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t230553031z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:05:45
last_update2016-07-30 23:05:45
depth3
children1
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length55
author_reputation2,454,708,915,685
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@jessejamesrock ·
Nice @dana-edwards 
 Shot you an Upvote :)
👎  
properties (23)
post_id363,274
authorjessejamesrock
permlinkartificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks
categorysecurity
json_metadata{}
created2016-07-30 23:10:51
last_update2016-07-30 23:10:51
depth1
children0
net_rshares-1,070,832,730
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length42
author_reputation-833,894,503,225
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@toroiskandar ·
wow cool
vote done @dana-edwards
@stellabelle nice
👍  
properties (23)
post_id363,317
authortoroiskandar
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t231343202z
categorysecurity
json_metadata"{"users": ["dana-edwards", "stellabelle"], "tags": ["security"]}"
created2016-07-30 23:13:45
last_update2016-07-30 23:13:45
depth1
children0
net_rshares1,623,240,443
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length50
author_reputation1,311,528,637,009
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@spookypooky · (edited)
You mention the IoT as a carrier of information (value) in your post. You seem well versed in blockchain tech, do you see the IoT / Cloud / Fog / Mist taking up the blockchain in tangible user experiences anytime soon?

Are we going toward an era where our mirror will give us a push notification and integrate with the Steemit chain while we brush our hair?
properties (22)
post_id363,341
authorspookypooky
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t231450337z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:14:51
last_update2016-07-30 23:16:00
depth1
children1
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length358
author_reputation2,590,200,204,531
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@dana-edwards ·
$0.05
I can't predict the future of IOT or of Steemit. I can say the future is currently looking very bright for both, as long as it's not over regulated.
👍  ,
properties (23)
post_id363,507
authordana-edwards
permlinkre-spookypooky-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t232709607z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:27:09
last_update2016-07-30 23:27:09
depth2
children0
net_rshares38,193,167,095
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.044 SBD
curator_payout_value0.011 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length148
author_reputation348,515,599,824,762
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (2)
@pheonike ·
I gotta read it again to fully understand it.
properties (22)
post_id363,378
authorpheonike
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160730t231708629z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-30 23:17:09
last_update2016-07-30 23:17:09
depth1
children0
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length45
author_reputation13,593,563,908,785
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@vianhandika ·
$0.03
this is what i need :) some knowledge in STEEMIT XD thanks @dana-edwards
👍  
properties (23)
post_id364,621
authorvianhandika
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160731t004408606z
categorysecurity
json_metadata"{"users": ["dana-edwards"], "tags": ["security"]}"
created2016-07-31 00:44:12
last_update2016-07-31 00:44:12
depth1
children0
net_rshares20,445,911,136
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.022 SBD
curator_payout_value0.005 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length72
author_reputation192,506,077,286
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@stellabelle ·
This is really fascinating. I learned a lot from the first video. I appreciate your high-quality content very much. I'll need to spend several weeks digesting all your information. Great job.
properties (22)
post_id365,852
authorstellabelle
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160731t023937559z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-31 02:39:36
last_update2016-07-31 02:39:36
depth1
children0
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length191
author_reputation436,515,832,240,166
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@williambanks ·
$0.64
@dana-edwards This isn't a rebuttal but it is a different perspective.

I read the IOTA whitepaper awhile back and had some talks via email with the members of the IOTA team.  The concept is nice but there is no solution to doing double spends that doesn't fall down horribly once you follow it to it's logical conclusion.  Basically you have to trust that you are getting valid information on the fly from your nearest neighbors because there is no "blockchain" to download and validate.  Instead it's a graph.  Also I'm not so sure it really qualifies as a directed acylical graph, seemed to me more like a 2 way response request graph.  Like a giant distributed mempool.

This allows the system to be fault tolerant and easier to deploy because you don't need a copy of every transaction since the beginning of time.  You can just ask your neighbors who ask their neighbors and eventually you get a more complete picture as to the history of that spend.

However it means you have to trust your nearest neighbor despite having no reason to.  A malicious attacker could control the entire network with less than 10% of the total nodes.  Their answer is to build it into enough devices that it becomes impractical to obtain that necessary 10%.

*I wish them the best of luck, but I'm not bagholdin that one*

DTNs are already an important part of the world.  The internet itself is a DTN.  The TCP/IP protocol was the worlds first wide scale implementation of a DTN.  The theory being that if the soviets bombed our infrastructure into the stoneage our military would still be able to communicate and mount an appropriate response.

It does this by detecting damage and routing around it.  Having been here on the internet for most of it's life, I always find it amusing when people try to reinvent it.

Old grey beard saying, "Those who fail to understand TCP/IP are doomed to re-implement it... poorly".

I do like this topic though.  TCP/IP is one example , the old usenet "store and forward" method is another.

I am having a hard time relating your concept of an artificial immune system to the topics though.  This seems to me to be just an natural advancement of current security hardening techniques.  Or am I missing the point?
👍  ,
properties (23)
post_id366,814
authorwilliambanks
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160731t040903925z
categorysecurity
json_metadata"{"users": ["dana-edwards"], "tags": ["security"]}"
created2016-07-31 04:09:06
last_update2016-07-31 04:09:06
depth1
children3
net_rshares398,599,032,416
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.485 SBD
curator_payout_value0.155 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length2,237
author_reputation90,735,613,033,058
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (2)
@dana-edwards · (edited)
If your neighbors are household devices then what is the issue? For an IoT it could work because you don't really need a blockchain for your devices, machine to machine. Of course I could be wrong.

As far as DTN goes, the DTN is a more resilient way of doing things. TCP/IP does have some properties for that built into the protocol but we are talking about IoT and TCP/IP alone is not good enough for moving devices.

Artificial immune systems relate not only to this topic but also to Steemit. If you look at the bot issue then you might be able to solve it by creating an artificial immune system which functions to keep the entire ecosystem of bots in a sort of delicate balance.  It relates to one of your own posts about bots.

And a bot is just at best an autonomous agent. So when we are talking about autonomous agents we could be talking about bots or drones. In the context of an intrusion detection system you can use an artificial immune system to provide a layer of security for an IoT, but I'll have to provide more details about how that is possible in a future post. 

If you want to investigate on your own, consider looking into how an artificial immune system can benefit Steemit in an environment with swarms of bots, and consider the vulnerabilities an IoT network could have in the context of a smart home for example and how an artificial immune system could function to detect intrusions, or hostile changes.
properties (22)
post_id368,169
authordana-edwards
permlinkre-williambanks-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160731t074440994z
categorysecurity
json_metadata"{"tags": ["security"]}"
created2016-07-31 07:44:39
last_update2016-07-31 07:49:24
depth2
children2
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length1,434
author_reputation348,515,599,824,762
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@williambanks · (edited)
Please promise me we aren't ushering in this...
https://www.youtube.com/watch?v=LRq_SAuQDec
*What I think of when I hear "internet of things"!*

I need sleep, been up all night on steemit again.  Will re-read your stuff and comment again in the morning.
👍  
properties (23)
post_id371,506
authorwilliambanks
permlinkre-dana-edwards-re-williambanks-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160731t134224040z
categorysecurity
json_metadata"{"links": ["https://www.youtube.com/watch?v=LRq_SAuQDec"], "tags": ["security"]}"
created2016-07-31 13:42:24
last_update2016-07-31 13:42:45
depth3
children0
net_rshares9,334,096,380
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length253
author_reputation90,735,613,033,058
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@williambanks ·
@dana-edwards Ok I had a good sleep and some time to think this through.

To answer your first question, a blockchain is a trustless system.  Trustless in the cryptographic sense.  
Imagine you have an IOT toaster, fridge, washer/dryer and TV.
Your fridge has an IOTA wallet inside to proactively order groceries and other household necessities like laundry soap.

If you already trust your toaster and you already trust your fridge, then no blockchain is necessary for your toaster to tell the fridge it might be time to call a service person because the bread isn't toasting properly.

The question then becomes, what if the TV becomes compromised?  So the TV airs a commercial, in the commercial is embedded a bit of code.  This code causes the TV to send a message that tells your fridge to order a video game and deliver it to /dev/null which of course gives the hacker the income from the sale.  It can deliver it to /dev/null because the message has a delivery address and the TV fakes an input signature from the owner saying "this is me".

The fridge can at best do a signature verification and then ask it's neighbors for some history.  If the TV is compromised it can very easily send fake verification because the network has no ability to check a timestamp in that sense.  This is what the blockchain gives us, a way of checking timestamps on transactions to ensure that they have been seen by the internet at large.

You can't trust your neighbors, not while they are connected to the internet not in a crypto sense.  Not in an automated sense.

This is why IOTA as I understand IOTA probably won't work.  They aren't thinking like a 16 year old kid in russia with nothing to lose.

As for an automated defense system.  @cheetah and others like him are already providing this so in a way you are right.  But what happens here is that a tit-for-tat bot war ensues for absolutely no reason.  This spams the blockchain with thousands of bots all trying to do their best to attack the bots they see as "the bad guy".

Here is an example.  Both you and @stellabelle are hive queens you just don't know it yet.

People have now created upvote bots.  These bots are upvoting both of you.
Their owners have created a system whereby if one of your posts is flagged, after they upvote it, the flagger will get stung mercilessly with downvotes.

This is because the owner is making a curation reward off your posts.  Thus they want to make sure that you make it to trending.  

You have acquired an automated distributed immune system. That's what that looks like in steemit world.

Furthermore, this immune system is contagious.  You upvote something and they swoop in to upvote as well.  You downvote something and they swarm in for an attack.

This is not your fault, it is not even a reaction to you, per se.  
If you weren't here and posting it would just be someone else who makes it to trending a bit more than the others.  Because the odds of making it to trending after being there once are enormously in your favor regardless of content.

In your case, it's simply that you have put out enough quality content, that their owners are taking their duty to curate what they view as the very best content, very seriously and frankly you produce the best stuff the most consistently.  @stellabelle then you, then dan and a handful of others.
 
Now here's the thing.  You personally have not, as far as I know actually been hive queen yet, but it is coming because it's the natural progression of an automated independent immune system.
Which is already beginning to happen...
https://steemit.com/steemit/@desmonid/s-o-s-i-m-being-targeted-by-a-malicious-downvote-bot

I'm going to use my blog this week to talk about this because it's dangerous and the proposed solutions are all trying to address the symptoms and not the root cause.  Unfortunately this isn't something we can automate away with rules changes that restrict activity.  it requires changing the game so this isn't incentivized and instead better bots are built that won't turn into a hornet's nest.  :)
👍  
properties (23)
post_id386,035
authorwilliambanks
permlinkre-dana-edwards-re-williambanks-re-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160801t065208132z
categorysecurity
json_metadata"{"users": ["dana-edwards", "cheetah", "stellabelle"], "links": ["https://steemit.com/steemit/@desmonid/s-o-s-i-m-being-targeted-by-a-malicious-downvote-bot"], "tags": ["security"]}"
created2016-08-01 06:52:09
last_update2016-08-01 06:52:09
depth3
children0
net_rshares9,334,096,380
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length4,076
author_reputation90,735,613,033,058
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@treeleaves ·
For a summary and review of some of dana-edwards' articles, see <a href="/dana-edwards/@treeleaves/the-best-of-dana-edwards-summary-and-analysis-of-swarm-ai">The best of @dana-edwards:  Summary and Analysis of Swarm AI</a>.
properties (22)
post_id485,954
authortreeleaves
permlinkre-dana-edwards-artificial-immune-systems-intrusion-detection-and-disruption-tolerant-networks-20160807t022818948z
categorysecurity
json_metadata"{"links": ["/dana-edwards/@treeleaves/the-best-of-dana-edwards-summary-and-analysis-of-swarm-ai"], "tags": ["security"]}"
created2016-08-07 02:28:18
last_update2016-08-07 02:28:18
depth1
children0
net_rshares0
last_payout2016-08-30 11:46:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length223
author_reputation3,841,001,214,129
root_title"Artificial Immune Systems, Intrusion Detection and Disruption Tolerant Networks"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000