Immunity-inspired Risk Assessment Approach for Network Security

被引:7
|
作者
Sun, Fei-xian [1 ]
Zhang, Shen-wu [1 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou, Peoples R China
关键词
risk assessment; network security; immune; SYSTEMS; OPTIMIZATION;
D O I
10.1109/WISM.2009.110
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk assessment is one of the most important issues in network security research. Inspired by the principles of artificial immune system, a novel risk assessment approach for network security, referred to as IRAA, is proposed in this paper. After defining the concepts and formal definitions, the architecture and principles of IRAA are described. And then, the lifecycle models of mature and memory lymphocytes are built. Theoretical analysis and experimental results show that IRAA is valid, and it has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.
引用
收藏
页码:515 / 518
页数:4
相关论文
共 50 条
  • [1] IMMUNITY-INSPIRED MEDICAL ASSISTANT ROBOTS
    Gong, T.
    Long, Y. L.
    Li, L.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2017, 121 : 34 - 35
  • [2] A Novel Predication Approach for Network Security Situation Inspired by Immunity
    Shi Yuan-quan
    Li Tao
    Chen Wen
    Zhang Rui-rui
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 849 - 855
  • [3] Novel Immunity-inspired Windows Rootkit Detection
    Zhang, Yu
    Li, Yana
    Xia, Feng
    Luo, Ziqiang
    2012 7TH INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2012, : 54 - 57
  • [4] An Immunity-inspired Relocation Method for Unknown Malware Detection
    Zhang, Yu
    Wu, Lihua
    Luo, Ziqiang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL, 2015, 20 : 75 - 78
  • [5] A Network Security Risk Assessment Method based on Immunity Algorithm
    Yuan Hao
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953
  • [6] A biological immunity-inspired novelty detection algorithm for rotor system monitoring
    Dong, YG
    Dong, ES
    Jia, HB
    Lv, W
    DAMAGE ASSESSMENT OF STRUCTURES VI, 2005, 293-294 : 71 - 78
  • [7] Risk Assessment Approach of In-Vehicle Network Information Security
    Wanh, Jian
    Zhang, Shaowei
    Chen, Hengwei
    Wang, Pengcheng
    CICTP 2022: INTELLIGENT, GREEN, AND CONNECTED TRANSPORTATION, 2022, : 1957 - 1968
  • [8] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [9] An immunity based network security risk estimation
    Li, T
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (05): : 557 - 578
  • [10] An immunity based network security risk estimation
    LI Tao Department of Computer Science
    Science in China(Series F:Information Sciences), 2005, (05) : 557 - 578