Skip to main content
Log in

ProgramID

  • Published:
Discrete Event Dynamic Systems Aims and scope Submit manuscript

Abstract

Although systems engineers have developed powerful tools for measuring, modeling, and optimizing system performance, system security is much less well understood. This paper discusses the issue of system security in the context of Internet security and introduces a simple idea called ProgramID. ProgramID is an example of a strategy based on a principle we call think globally, act locally (TGAL), a general principle for distributed, decentralized management of networks. Under the TGAL principle, a combination of simple security strategies acting at a local level can produce measurable increases in global security. ProgramID can be implemented via a simple service that users can add to their operating system to force programs to identify themselves before they can execute. This gives individual computer users an extra layer of protection against malicious programs such as the increasingly prevalent email viruses. Using epidemic-like models, we analyze how global security is impacted when some fraction of Internet users have ProgramID protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Bontchev, V. Are “Good” computer viruses still a bad idea. http://securityresponse.symantec.com/

  • Clark, D. The design philosophy of the DARPA internet protocols. Proceedings of ACM SIGCOMM 1988, Stanford, CA, August 1988, vol. 18 No. 4. http://www.acm.org/sigcomm/ccr/archive/1995/jan95/ccr-9501-clark.html

  • Ho, Y.-C., and Pepyne, D. L. A conceptual framework for optimization and distributed intelligence. To appear Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004.

  • Ivanov, I. Detecting Windows NT/2K process execution. http://www.codeproject.com/threads/procmon.asp

  • Newman, M. E. J., and Watts, D. J. 1999. Scaling and percolation in the small world network model. Physical Review E 60: 7332–7342.

    Google Scholar 

  • Pfleeger, C. P., and Pfleeger, S. H. 2003. Security in Computing, 3rd edition. Prentice Hall.

  • Watts, D. J., and Strogatz, S. H. 1998. Collective dynamics of small world networks. Nature 393: 440–442.

    Google Scholar 

  • White, G. B., Fisch, E. A., and Pooch, U. W. 1996. Computer System and Network Security. CRC Press.

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ho, YC., Pepyne, D.L., Zhao, Q. et al. ProgramID. Discrete Event Dynamic Systems 14, 381–393 (2004). https://doi.org/10.1023/B:DISC.0000039786.13745.c7

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:DISC.0000039786.13745.c7

Keywords

Navigation