An immunity based network security risk estimation

被引:76
|
作者
Li, T [1 ]
机构
[1] Sichuan Univ, Dept Comp Sci, Chengdu 610065, Peoples R China
来源
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
artificial immune system; intrusion detection; network security; risk estimation;
D O I
10.1360/04yf0140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunity-based model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self, nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the self-tolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation, which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security.
引用
收藏
页码:557 / 578
页数:22
相关论文
共 50 条
  • [21] STATE ESTIMATION BASED EXTERNAL NETWORK SOLUTION FOR ONLINE SECURITY ANALYSIS
    GEISLER, KI
    BOSE, A
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1983, 102 (08): : 2447 - 2454
  • [22] Research on anomaly detection of network security situation based on interval estimation
    Shen L.
    Wen Z.
    Journal of Computational Methods in Sciences and Engineering, 2020, 20 (01): : 13 - 24
  • [23] Research on anomaly detection of network security situation based on interval estimation
    Shen, Liang
    Wen, Zhicheng
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2020, 20 (01) : 13 - 24
  • [24] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [25] A Network Security Risk Assessment Framework Based on Game Theory
    He, Wei
    Xia, Chunhe
    Zhang, Cheng
    Ji, Yi
    Ma, Xinyi
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 742 - 746
  • [26] Network Security Risk Assessment Based on Enterprise Environment Characteristics
    Yang, Yunxue
    Yang, Zhenqi
    Yang, Qin
    Ji, Guohua
    Xue, Shengjun
    International Journal of Network Security, 2022, 24 (01) : 156 - 165
  • [27] Network security risk analysis based on graph theoretical methods
    Lin, Zefu
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 510 - 516
  • [28] Research on Network Security Risk Assessment Based on Group Consistency
    Liu Xiang-qin
    Chen Xia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 425 - 428
  • [29] Security Risk Assessment Based on CRITIC and Improved Neural Network
    Cai, Lijuan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 142 - 147
  • [30] A proposal for an agent based security risk assessment in a Community Network
    Saylani, Najib
    Managing Information in the Digital Economy: Issues & Solutions, 2006, : 733 - 737