Immunity-inspired Risk Assessment Approach for Network Security

被引:7
|
作者
Sun, Fei-xian [1 ]
Zhang, Shen-wu [1 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou, Peoples R China
关键词
risk assessment; network security; immune; SYSTEMS; OPTIMIZATION;
D O I
10.1109/WISM.2009.110
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk assessment is one of the most important issues in network security research. Inspired by the principles of artificial immune system, a novel risk assessment approach for network security, referred to as IRAA, is proposed in this paper. After defining the concepts and formal definitions, the architecture and principles of IRAA are described. And then, the lifecycle models of mature and memory lymphocytes are built. Theoretical analysis and experimental results show that IRAA is valid, and it has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.
引用
收藏
页码:515 / 518
页数:4
相关论文
共 50 条
  • [31] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [32] Network Security Risk Assessment Based on Node Correlation
    Wang, Zengguang
    Lu, Yu
    Li, Jindong
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [33] A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty
    Duan, Yancui
    Cai, Yonghua
    Wang, Zhikang
    Deng, Xinyang
    APPLIED SCIENCES-BASEL, 2018, 8 (03):
  • [34] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [35] Network security risk assessment of UPIDs in the distribution system
    Yan K.
    Lu Y.
    Qin F.
    Liu X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (11): : 64 - 76
  • [36] RBF Neural Network Approach For Security Assessment And Enhancement
    Srilatha, N.
    Yesuratnam, G.
    Deepthi, M. Shiva
    2014 IEEE PES T&D CONFERENCE AND EXPOSITION, 2014,
  • [37] Immunity inspired Cooperative Agent based Security System
    Saurabh, Praneet
    Verma, Bhupendra
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (02) : 289 - 295
  • [38] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [39] Cyber Security Risk Modelling and Assessment: A Quantitative Approach
    Sokri, Abderrahmane
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 466 - 474
  • [40] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 229 - 229