Computer network security risk evaluation

被引:0
|
作者
Li, T. [1 ]
机构
[1] Sichuan Univ, Coll Comp, Chengdu 610065, Peoples R China
来源
DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS | 2006年 / 13E卷
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Inspired by the relationship between antibody concentration and intrusion intensity of pathogens in the human immune system, here we demonstrate that the way, which a doctor diagnoses a patient by checking the patient's temperature, can be exploited to evaluate the security risk faced by a computer network. In this model, which we call network temperature evaluation, the system itself learns what attacks it suffers, where the intrusions occur, whether the intrusions are serious or not. In addition, the system learns what the current popular attacks are, and where the most serious disastrous area is. With the proposed techniques, all the above information can be calculated quantitatively and in real-time.
引用
收藏
页码:2361 / 2365
页数:5
相关论文
共 50 条
  • [41] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [42] Computer Science Students' Perception of Computer Network Security
    Cambazoglu, Volkan
    Thota, Neena
    2013 LEARNING AND TEACHING IN COMPUTING AND ENGINEERING (LATICE 2013), 2013, : 204 - 207
  • [43] Discussion and research of computer network security
    Zeng, Ailin, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):
  • [44] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [45] Methods for Strengthening a Computer Network Security
    Purboyo, Tito Waluyo
    Kuspriyanto
    PROCEEDINGS OF THE 2013 JOINT INTERNATIONAL CONFERENCE ON RURAL INFORMATION & COMMUNICATION TECHNOLOGY AND ELECTRIC-VEHICLE TECHNOLOGY (RICT & ICEV-T), 2013,
  • [46] Computer Network Security Analysis and Research
    Cui, Limei
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 945 - 947
  • [47] Research on Computer Network Security and Protection
    Liang, Tiantian
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [48] Computer network security and cyber ethics
    Cervone, H. Frank
    PORTAL-LIBRARIES AND THE ACADEMY, 2007, 7 (02) : 249 - 250
  • [49] Computer Network Security Several Strategies
    Zhang, Kun
    Wang, Hai-feng
    Zhu, Jian-feng
    Li, Zhuang
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 75 - 78
  • [50] The Study on Computer Network Security and Precaution
    Sun Xiaoling
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1695 - 1698