Immunity-inspired Risk Assessment Approach for Network Security

被引:7
|
作者
Sun, Fei-xian [1 ]
Zhang, Shen-wu [1 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou, Peoples R China
关键词
risk assessment; network security; immune; SYSTEMS; OPTIMIZATION;
D O I
10.1109/WISM.2009.110
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk assessment is one of the most important issues in network security research. Inspired by the principles of artificial immune system, a novel risk assessment approach for network security, referred to as IRAA, is proposed in this paper. After defining the concepts and formal definitions, the architecture and principles of IRAA are described. And then, the lifecycle models of mature and memory lymphocytes are built. Theoretical analysis and experimental results show that IRAA is valid, and it has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.
引用
收藏
页码:515 / 518
页数:4
相关论文
共 50 条
  • [41] A danger theory inspired multi-agent fusion model for network security assessment
    Zhou, ZhenYu
    Shen, JianJing
    Zhang, XinPeng
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 599 - +
  • [42] Resource Allocation for Network Security Risk Assessment:A Non-Cooperative Differential Game Based Approach
    XU Haitao
    LIN Ruijie
    中国通信, 2016, 13 (04) : 131 - 135
  • [43] Resource Allocation for Network Security Risk Assessment: A Non-Cooperative Differential Game Based Approach
    Xu Haitao
    Lin Ruijie
    CHINA COMMUNICATIONS, 2016, 13 (04) : 131 - 135
  • [44] Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities
    Zhou, Buxiang
    Sun, Binjie
    Zang, Tianlei
    Cai, Yating
    Wu, Jiale
    Luo, Huan
    ENTROPY, 2023, 25 (01)
  • [45] Risk assessment of power system network security based on RBF neural network
    Yu Y.
    Di C.
    Guo X.
    International Journal of Power and Energy Conversion, 2023, 14 (2-3) : 148 - 158
  • [46] A Network Security Risk Assessment Framework Based on Game Theory
    He, Wei
    Xia, Chunhe
    Zhang, Cheng
    Ji, Yi
    Ma, Xinyi
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 742 - 746
  • [47] Virtualization for Effective Risk-free Network Security Assessment
    Carchiolo, V.
    Longheu, A.
    Malgeri, M.
    Mangioni, G.
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2014, 10 (05) : 21 - 28
  • [48] Network Security Risk Assessment Based on Enterprise Environment Characteristics
    Yang, Yunxue
    Yang, Zhenqi
    Yang, Qin
    Ji, Guohua
    Xue, Shengjun
    International Journal of Network Security, 2022, 24 (01) : 156 - 165
  • [49] Research on Network Security Risk Assessment Based on Group Consistency
    Liu Xiang-qin
    Chen Xia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 425 - 428
  • [50] Security Risk Assessment Based on CRITIC and Improved Neural Network
    Cai, Lijuan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 142 - 147