Danger Theory Inspired Model for Network Security Situation Awareness

被引:0
|
作者
Sun, Feixian [1 ,2 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou, Henan, Peoples R China
[2] Zhengzhou Key Lab Comp Network Secur Assessment, Zhengzhou, Henan, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III | 2011年
关键词
danger theory; network security; situation awareness; ALGORITHM; IMMUNITY; SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The danger theory is changing the traditional thinking ways of self/non-self discrimination. Aiming at the deficiencies of the immunity based security situation awareness method, a danger theory inspired model for network security situation awareness is proposed in this paper. After introducing the main idea of danger theory, the model architecture and the formal definitions of state space, antigen, antibody, affinity and danger signal, are defined. Following that, with the danger signal computation method illustrated, the principle of security situation awareness is given. Theoretical analysis shows that the proposed model is feasible. Thus, it provides a good solution to the field of information security evaluation.
引用
收藏
页码:520 / 523
页数:4
相关论文
共 20 条
  • [1] de Castro LN, 2003, SOFT COMPUT, V7, P526, DOI [10.1007/S00500-002-0237-z, 10.1007/S00500-002-0237-Z]
  • [2] Du HF, 2005, PROG NAT SCI-MATER, V15, P463
  • [3] Feixian Sun, 2010, Proceedings of the 2010 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2010), P74, DOI 10.1109/NSWCTC.2010.25
  • [4] Feixian Sun, 2008, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering (ICBBE '08), P644
  • [5] Computer immunology
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (10) : 88 - 96
  • [6] Optimal approximation of linear systems by artificial immune response
    Gong, MG
    Du, HF
    Jiao, LC
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 63 - 79
  • [7] Hofmeyr SA, 1999, GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, P1289
  • [8] Architecture for an Artificial Immune System
    Hofmeyr, Steven A.
    Forrest, Stephanie
    [J]. EVOLUTIONARY COMPUTATION, 2000, 8 (04) : 443 - 473
  • [9] Junmin Zhang, 2008, 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application. PACIIA 2008, P867, DOI 10.1109/PACIIA.2008.283
  • [10] Kim J, 2005, LECT NOTES COMPUT SC, V3627, P168