Network Security Situation Awareness Model-Inspired by Immune

Article Preview

Abstract:

Network security situation awareness is the pivotal technology of building the next generation active defensible network, which has been got widespread concerns by experts and scholars. Inspired-by artificial immune, an immune-inspired network security situation awareness model, referred as Ineim, was given. The real-time network security situation awareness equations were built up, which can exactly compute security situation awareness of the host and network. Both the theory analysis and experimental results prove that Ineim provides a positive and active network security method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

635-638

Citation:

Online since:

June 2011

Export:

Price:

[1] Bass T. Intrusion systems and multisensor data fusion. Communications of the ACM, Vol. 43 (2000), p.99.

Google Scholar

[2] D' Ambrosio B. in: Security situation assessment and response evaluation (SSARE). DISCEX'2001. Proceedings, DARPA Information Survivability Conference & Exposition II. Los Alamitos: IEEE Computer Society, (2001).

DOI: 10.1109/discex.2001.932233

Google Scholar

[3] V. Gorodetsky, O. Karsaev, V. Samoilov, in: On-Line Update of Situation Assessment Based on Asynchronous Data Streams. Proceeding of the KES2004: Proceedings of the 8th International Conference on Knowledge-Based Intelligent Information & Engineering Systems, (2004).

DOI: 10.1007/978-3-540-30132-5_154

Google Scholar

[4] V. Yegneswaran, P. Barford, and V. Paxson. in: Using Honeynets for Internet Situational Awareness. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland, (2005).

Google Scholar

[5] Zhang H.X., Su P.R., Feng D.G. Network security analysis model based on the increase in attack ability. Journal of Computer Research and Development, Vol. 44 (2007), p. (2012).

Google Scholar

[6] Li T. An immune based dynamic intrusion detection model, Chinese Science Bulletin, Vol. 50 (2005), p.2650.

Google Scholar

[7] Chen X.Z., Zheng Q.H., Guan X.H., Lin C.G., Quantitative hierarchical threat evaluation model for network security, Journal of Software, Vol. 17 (2006), p.885.

Google Scholar

[8] Zhang Y.Z., FANG B.X., CHI Y., and YUN X.C., Risk Propagation Model for Assessing Network Information Systems, Software Journal. Vol. 18 (2007), p.137.

Google Scholar

[9] Gong M. G., Jiao L. C., Liu F., Yang J. Memetic computation based on regulation between neural and immune systems: the framework and a case study. SCIENCE CHINA Information Sciences, Vol. 53 (2010), p.1519.

DOI: 10.1007/s11432-010-4019-4

Google Scholar

[10] Chilengue, Z., J.A. Dente, P.J.C. Branco. An artificial immune system approach for fault detection in the stator and rotor circuits of induction machines. Electric Power Systems Research, Vol. 81 (2011),. p.158.

DOI: 10.1016/j.epsr.2010.08.003

Google Scholar

[11] Bagheri, A., M. Zandieh, I. Mahdavi, M. Yazdani. An artificial immune algorithm for the flexible job-shop scheduling problem. Future Generation Computer Systems, Vol. 26 (2010), p.533.

Google Scholar