[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] emergent security properties
- To: Roland Dobbins <rdobbins@xxxxxxxxx>
- Subject: Re: [Full-disclosure] emergent security properties
- From: Peter Swire <peter@xxxxxxxxxxxxxx>
- Date: Tue, 26 Dec 2006 20:53:46 -0700
<div>In terms of complexity/size helping security, there may be
additional categories:</div>
<div> </div>
<div>1. Anomaly detection might be part of a broader category of
knowledge-based approaches that work better at large scale. For
instance, expert systems to detect credit card fraud or identity theft
detection tend to work better as the amount of data increases.</div>
<div> </div>
<div>2. A more controversial improvement with scale comes from
"data mining," however folks want to define that. It's a long
debate about when data mining works or is just marketing hype for
putting more hay on the haystack. But more data gives the
possibility of more knowledge.</div>
<div> </div>
<div>3. The open source approach to security believes that having
many eyes on a vulnerability increases the likelihood of detecting and
then creating a patch for the vulnerability. So security may
improve when there are many eyes looking at vulnerabilities.
(This last point suggests that a Full Disclosure list, for instance,
might improve security as the size of the system increases.)</div>
<div> </div>
<div>Peter<BR><BR>Prof. Peter Swire<BR>C. William O'Neill Professor of
Law<BR>Moritz College of Law of the<BR>Ohio State University<BR>Senior
Fellow, Center for American Progress<BR>(240) 994-4142, <A
href="http://www.peterswire.net/">www.peterswire.net</A><BR></div>
<DIV id=wmMessageComp name="wmMessageComp"><BR><BR>
<BLOCKQUOTE style="PADDING-LEFT: 8px; MARGIN-LEFT: 8px; BORDER-LEFT:
blue 2px solid">-------- Original Message --------<BR>Subject: Re:
[Full-disclosure] emergent security properties<BR>From: Roland Dobbins
<rdobbins@xxxxxxxxx><BR>Date: Tue, December 26, 2006 8:32
pm<BR>To: full-disclosure@xxxxxxxxxxxxxxxxx<BR><BR>On Dec 26, 2006, at
4:19 PM, coderman wrote:<BR><BR>> the only example that comes to
mind is distributed / collaborative<BR>> anomaly detection systems
which become more robust with a larger<BR>> number of entities and
interactions to observe.<BR></BLOCKQUOTE></DIV>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/