Research on Situation Evaluation Based on Artificial Immune for Network Security

Article Preview

Abstract:

As a new research area of network security, network security situation evaluation is significant for achieving large-scale network security monitoring. In this paper, the artificial immune technology is applied to the study of situation evaluation for network security. Mathematical expressions of immune elements such as antibodies, antigens are established, and basic immune mechanism such as self-tolerance, clone selection, immune memory are achieved. According to the relationships between concentration changes of antibodies and attack intensity of pathogens in biological immune system, a situation evaluation model for network security is proposed. In addition, this paper adopts the uncertainty reasoning method in the cloud theory to make multi-granularity analysis for network security situation. By modeling the security situation indicator, and using cloud rules generator and reverse cloud generator, we can get qualitative results of hosts and network's security situation. Theoretical analysis and experimental results show that the model is effective to evaluate situation for network security with advantages of real-time, adaptability and high accuracy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4926-4930

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mica R. Endsley: Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors Journal. 37(1): 32-64P(1995).

Google Scholar

[2] Bass Tim: Intrusion Detection System and Multi-sensor Data Fusion: Creating Cyberspace Situational Awareness. Communications of the ACM, 43(4): 99-105(2000).

Google Scholar

[3] Jerne N K: Towards a Network Theory of the Immune System[J]. Annual Immunology, 24 (3): 125 - 134. (1974).

Google Scholar

[4] Forrest S, Perelson, Allen L, et al: Self2nonself Discrimination in A Computer [C] /Proc of IEEE Symposium on Research in Security and Privacy. Oakland. (1994), pp.54-64.

Google Scholar

[5] Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan: Quantitative Hierarchical Threat Evaluation Model for Network Security [J] . Journal of Software (2006) , 17 (4) : 8852897, in Chinese.

Google Scholar

[6] Hui Li, Qinghua Zheng, ChongZhao Han: Research of Invasion Scenarios Reconstruction based on Multiple Hypothesis Tracking[J]. Journal of Communications. 26(4)(2005), pp.70-79.

Google Scholar

[7] Tao Li: An Immune Based Model for Network Monitoring, Chinese Journal of Computers Vol. 29 (2006), pp.1515-1522, in Chinese.

Google Scholar

[8] Deyi Li, Changyu Liu, Yi Du, Xu Han: Artificial Intelligence with Uncertainty. Journal of Software Vol. 15 (2004): pp.1583-1594, in Chinese.

Google Scholar