Paper Title:
Danger Theory Based Risk Evaluation Model for Smurf Attacks
  Abstract

Smurf attack belongs to popular Denial-of-Service (DoS) attack, and they can cause devastating impact on computer systems. Inspired by the principles of immune danger theory, a novel risk evaluation model, referred to as DTRESA, for smurf attacks is proposed in this paper. Within the presented model, dangerous smurf attacks are compared to bacterium (or virus) of the immune danger theory, which induce danger signal by simulating cellular distress or cell unnatural death; through immune recognition of artificial lymphocytes, the attacks are detected, and the attack risk is evaluated by calculating the danger signal of host computers. Simulation results and theoretical analysis show that the proposed model is feasible. Thus, it provides a novel solution to DoS detection and computer network security risk assessment.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
515-521
DOI
10.4028/www.scientific.net/KEM.467-469.515
Citation
F. X. Sun, "Danger Theory Based Risk Evaluation Model for Smurf Attacks", Key Engineering Materials, Vols. 467-469, pp. 515-521, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Hao Yuan
Abstract:Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security...
948
Authors: Tao Gong, Jia Jia Zhou, Lei Qi
Abstract:Building on three theoretical paradigms (student model, ICAI model, and multi-dimension education immune agent), some intelligent techniques...
637
Authors: Fei Xian Sun
Abstract:Inspired by the principles of immunity, a danger theory based model for network security risk assessment is proposed. After introducing the...
148
Authors: Jian Hong Ma, Li Xia Ji
Chapter 3: Control Engineering, Monitoring and Control System
Abstract:In order to solve the traditional network monitor management system fault detection of slow problem,adaptive differential of high false alarm...
285
Authors: Wei Gong
Chapter 9: Theory and Practice of Information Technologies and Communications
Abstract:The abilities of summarization, learning and self-fitting and inner-parallel computing make artificial neural networks suitable for intrusion...
1772