Paper Title:
A Danger Theory Inspired Security Evaluation Paradigm for Computer Network
  Abstract

Inspired by the potential interesting ideas of the danger theory, a novel security evaluation paradigm for network security, it is called DTPSE, is proposed in this paper. Within DTPSE, computer network attacks are regarded as bacterium, which are dangerous, and induce danger signals through simulating cells undergoing injury, or stress or 'bad cell death'; the network evaluation centre can dynamically aware the security risk by fusion the danger signals received from host-based sensors. Theoretical analysis shows that the proposed paradigm is feasible. Thus, it provides a novel solution to information security risk assessment.

  Info
Periodical
Advanced Materials Research (Volumes 179-180)
Edited by
Garry Zhu
Pages
1333-1337
DOI
10.4028/www.scientific.net/AMR.179-180.1333
Citation
F. X. Sun, "A Danger Theory Inspired Security Evaluation Paradigm for Computer Network", Advanced Materials Research, Vols. 179-180, pp. 1333-1337, 2011
Online since
January 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Hong Xing Zhang, Jin Shan Zhu, Ke Jia He, Zhao Xiao Wu
Chapter 6: Materials and Mechanics Information System
Abstract:Since some security flaws exist in the arp protocol, some network attacks may arise such as arp overflow, arp spoofing and so on. By...
582
Authors: Ting Zhang, Lin Hong Guo
Chapter 10: Environmentally Sustainable Manufacturing Processes and Systems
Abstract:The key problem of the network and information security is protect the computer system and network effectively. An open virtual experiment...
2221
Authors: Shao Feng Lin, Xiao Peng Li
Chapter 3: Control Engineering, Monitoring and Control System
Abstract:In the network security monitoring system, it is important to trace information source timely and accurately, which is an important way to...
319
Authors: Jun Cai, Wai Xi Liu
Chapter 1: Mechatronics, Control and Management, Measurement and Instrumentation, Monitoring Technologies
Abstract:As Internet communications and applications become more and more complex, accurately describing network traffic information and rapidly...
912
Authors: Ru Yang
Chapter 2: Manufacturing Technologies and Application
Abstract:Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the...
191