Immunity-inspired Risk Assessment Approach for Network Security

被引:7
|
作者
Sun, Fei-xian [1 ]
Zhang, Shen-wu [1 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou, Peoples R China
关键词
risk assessment; network security; immune; SYSTEMS; OPTIMIZATION;
D O I
10.1109/WISM.2009.110
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk assessment is one of the most important issues in network security research. Inspired by the principles of artificial immune system, a novel risk assessment approach for network security, referred to as IRAA, is proposed in this paper. After defining the concepts and formal definitions, the architecture and principles of IRAA are described. And then, the lifecycle models of mature and memory lymphocytes are built. Theoretical analysis and experimental results show that IRAA is valid, and it has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.
引用
收藏
页码:515 / 518
页数:4
相关论文
共 50 条
  • [11] An immunity based network security risk estimation
    Tao Li
    Science in China Series F: Information Sciences, 2005, 48 : 557 - 578
  • [12] Fuzzy risk assessment of the network security
    Zhao, Dong-Mei
    Wang, Jing-Hong
    Ma, Jian-Feng
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4400 - +
  • [13] A systematic approach to network security assessment
    Rasti, M
    Sarramy, D
    Khaleghi, M
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2004, : 79 - 84
  • [14] Biological Inspired Approach in Parallel Immunology System for Network Security
    Elsadig, Muna
    Abdullah, Azween
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 111 - 116
  • [15] Mathematical Approach to Security Risk Assessment
    Vrabel, Robert
    Abas, Marcel
    Tanuska, Pavol
    Vazan, Pavel
    Kebisek, Michal
    Elias, Michal
    Sutova, Zuzana
    Pavliak, Dusan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [16] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [17] A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY
    Zhao Dongmei Wang Changguang Ma Jianfeng (College of Computer Science and Technology
    Journal of Electronics(China), 2007, (03) : 428 - 432
  • [18] Review of Network Security Risk Assessment Methods
    Yang, Sun
    Wei, Xiong
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 430 - 434
  • [19] Discussion on risk assessment of network security management
    Ye Yalin
    Yan Lina
    Sun Weifeng
    Zhang Qian
    Wang Ning
    2018 10TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2018, : 409 - 411
  • [20] A risk assessment model for enterprise network security
    Yang, Fu-Hong
    Chi, Chi-Hung
    Liu, Lin
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 293 - 301