A Novel Predication Approach for Network Security Situation Inspired by Immunity

Article Preview

Abstract:

To effectively prevent large-scale network security attacks, a novel Predication Approach for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication approach, the concepts and formal definitions of antigen and antibody in the network security situation predication domain are given; meanwhile, the mathematical models of some antibody evolution operators being related to PANSSI are exhibited. By analyzing time series and computing the affinity between antigen and antibody in artificial immune system, network security situation predication model is established, and then the future situation of network security attacks is predicted by it. Experimental results prove that PANSSI can forecast the future network security situation real-timely and correctly, and provides a novel approach for network security situation predication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

849-855

Citation:

Online since:

January 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M.R. Endsley: Design and evaluation for situation awareness enhancement. Human Factors Society 32nd Annual Meeting, Anaheim, CA (1988), p.97.

DOI: 10.1177/154193128803200221

Google Scholar

[2] T. Bass: Intrusion Detection Systems and Multisensor Data Fusion: Creating Cyberspace Situational Awareness. Communications of the ACM Vol. 43(2000), p.99.

DOI: 10.1145/332051.332079

Google Scholar

[3] CHEN Xiu-zhen, ZHENG Qing-hua, et al: Study on evaluation for security situation of networked systems. Journal of Xi'an Jiaotong University Vol. 38(2004), p.404.

Google Scholar

[4] S.G. Batsell, N. S. Rao and M. Shankar: Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security. Information on http: /www. ioc. ornl. gov/projects/documents- /containment. pdf.

Google Scholar

[5] J. Shifflet: A Technique Independent Fusion Model for Network Intrusion Detection. Information on http: /www. jcu. edu/math/swarm/papers/Jason2005. pdf.

Google Scholar

[6] L.N. De Castro, J. Timmis: Artificial Immune Systems: A New Computational Intelligence Approach. Springer-Verlag(2002), p.53.

Google Scholar

[7] Li Tao: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004).

Google Scholar

[8] Li Tao: An immunity based network security risk estimation. Science in China Ser F Information Sciences Vol. 48(2005), p.557.

Google Scholar

[9] JIAO Li-cheng, DU Hai-feng: Development and Prospect of the Artificial Immune System. Acta Electronica Sinca Vol. 31(2003), p.1540.

Google Scholar

[10] L. N. de Castro, F. J. Von Zuben: The clonal selection algorithm with engineering applications. In Workshop Proceedings of GECCO'00, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, USA(2000), p.36.

Google Scholar

[11] Maoguo Gong, Licheng Jiao, et al: Immune secondary response and clonal selection inspired optimizers. Progress in Natural Science Vol. 19(2009), p.237.

DOI: 10.1016/j.pnsc.2008.05.026

Google Scholar

[12] Zhaohui Gan, Tommy W.S. Chow and W.N. Chau: Clone selection programming and its application to symbolic regression. Expert Systems with Applications Vol. 36(2009) p.3996.

DOI: 10.1016/j.eswa.2008.02.030

Google Scholar

[13] Zhou Zhi-hua, Cao Cun-gen: Neural network and its application. Tsinghua University Press, Beijing (2004).

Google Scholar

[14] George G. Szpiro: Forecasting chaotic time series with genetic algorithms. The American Physical Society (1997), p.2557.

Google Scholar

[15] Sun Ning: Artificial Immune Optimization Algorithm and Applications. Harbin Institute of Technology, Harbin (2006).

Google Scholar

[16] Richard F. Gilberg, Behrouz A. Forouzan: Data Structures-A Pseudocode Approach with C++. Posts & Telecommunications Press, Beijing (2002).

Google Scholar