An immunity based network security risk estimation

被引:75
作者
Li, T [1 ]
机构
[1] Sichuan Univ, Dept Comp Sci, Chengdu 610065, Peoples R China
来源
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES | 2005年 / 48卷 / 05期
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
artificial immune system; intrusion detection; network security; risk estimation;
D O I
10.1360/04yf0140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunity-based model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self, nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the self-tolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation, which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security.
引用
收藏
页码:557 / 578
页数:22
相关论文
共 24 条
  • [1] Alberts C.J., 2001, OCTAVE METHOD IMPLEM
  • [2] CAN PROGRAMMING BE LIBERATED FROM VON NEUMANN STYLE - FUNCTIONAL STYLE AND ITS ALGEBRA OF PROGRAMS
    BACKUS, J
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (08) : 613 - 641
  • [3] BURNET FM, 1959, CLONAL SELECTION THE
  • [4] An integrated framework for the assessment of network operations, reliability, and security
    Chu, CHK
    Chu, M
    [J]. BELL LABS TECHNICAL JOURNAL, 2004, 8 (04) : 133 - 152
  • [5] Dasgupta D., 1999, 22 NAT INF SYST SEC, P147
  • [6] de Castro LeandroN., 2002, ARTIFICIAL IMMUNE SY
  • [7] de Castro LN, 2003, SOFT COMPUT, V7, P526, DOI [10.1007/S00500-002-0237-Z, 10.1007/S00500-002-0237-z]
  • [8] Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
  • [9] Computer immunology
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (10) : 88 - 96
  • [10] An artificial immune system architecture for computer security applications
    Harmer, PK
    Williams, PD
    Gunsch, GH
    Lamont, GB
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) : 252 - 280