12.4. Integrated Dynamic Security Approach

As shown in [], the OODA (Observe, Orient, Decide, Act) loop approach described by J. Boyd [] provides an interesting support for modeling a system where states change according to information provided by external sources. In Figure 12.5, we present a model for the security of cognitive networks based on the definition of operational planes and OODA loops operating on each of these planes. In this model, we will blend the concepts from intrusion detection and cognitive networks to offer a comprehensive picture of the mechanisms of intrusion detection that can operate in a cognitive network and the interactions with other components.

The model presented in [] includes information provided by the environment. In our case, three categories of management information are modeled. Generically called policies, the first category is information that flows from the top (network operator) down to the network nodes, and describes the operational objectives of the cognitive network. Generically called alerts, the second category of information flows from the bottom to the top and signals issues encountered during the operation of the network.

12.4.1. Description of the Operational Planes and their Interactions

In Figure 12.4, we describe a generic architecture of a network node as being composed of two parts: a service unit that carries out the business of the network node and a management unit that controls and configures the service unit. We will ...

Get Cognitive Networks: Towards Self-Aware Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.