Research on Situation Evaluation Based on Artificial Immune for Network Security

被引:0
作者
Zhang, Ruirui [1 ]
Xiao, Xin [1 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Sichuan, Peoples R China
来源
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6 | 2012年 / 121-126卷
关键词
artificial immune; network security; risk evaluation; cloud model; SYSTEMS;
D O I
10.4028/www.scientific.net/AMM.121-126.4926
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As a new research area of network security, network security situation evaluation is significant for achieving large-scale network security monitoring. In this paper, the artificial immune technology is applied to the study of situation evaluation for network security. Mathematical expressions of immune elements such as antibodies, antigens are established, and basic immune mechanism such as self-tolerance, clone selection, immune memory are achieved. According to the relationships between concentration changes of antibodies and attack intensity of pathogens in biological immune system, a situation evaluation model for network security is proposed. In addition, this paper adopts the uncertainty reasoning method in the cloud theory to make multi-granularity analysis for network security situation. By modeling the security situation indicator, and using cloud rules generator and reverse cloud generator, we can get qualitative results of hosts and network's security situation. Theoretical analysis and experimental results show that the model is effective to evaluate situation for network security with advantages of real-time, adaptability and high accuracy.
引用
收藏
页码:4926 / 4930
页数:5
相关论文
共 8 条
[1]   Intrusion detection systems and multisensor data fusion [J].
Bass, T .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :99-105
[2]  
Chen Xiuzhen, 2006, J SOFTWARE, V17
[3]   TOWARD A THEORY OF SITUATION AWARENESS IN DYNAMIC-SYSTEMS [J].
ENDSLEY, MR .
HUMAN FACTORS, 1995, 37 (01) :32-64
[4]  
Jerne N K, 1974, ANN IMMUNOLOGY, V24, P125
[5]  
Li De-Yi, 2004, Journal of Software, V15, P1583
[6]  
[李辉 Li Hui], 2005, [通信学报, Journal on Communications], V26, P70
[7]  
Li Tao, 2006, Chinese Journal of Computers, V29, P1515
[8]  
S Forrest, 1994, P IEEE S RES SEC PRI, P54