Research of Immune Network Defense System Based on Black Hole Theory

Article Preview

Abstract:

Active defense technology may predict future attack situation and detect unknown attacks, but it has many questions to will be researched: vulnerability, lower mal-ware detection rate, security situation awareness technology has faced problem of inter-organization cooperation, real-time response, correlation analysis, high-load low fault tolerance. Artificial immune technology combines with active defense technology to solve integrated artificial immune security situation awareness system with artificial immune technology and active defense technology by Black Hole theory and for diversification ad development characteristics of the artificial immune and active defense, gives a method about simulating Black Hole accretion theory to achieve absorption and utilization a variety of security and virus technology; a no escaped mechanism simulate the Black Hole; a method about access control method based on Hawking radiation theory. Based on the above work, applies virtual and sandbox technology to achieve network system itself virus immunity, and then that we implement re-engineering and reverse engineering for virus technology in order to study virus and dig more holes, create unified integrated defense tactics, so this defense system will improve ability of situation comprehension, situation prediction and intelligence decision.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3023-3028

Citation:

Online since:

March 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] LI Shuo,DAI Xin,ZHOU Yu-xia. Research Progress of Network Security Situation Awareness [J]. Application Research of Computers, 2010. 09, 9(27): 3227-3231.

Google Scholar

[2] Edward G Amoroso. Cyber attacks: awareness [J]. Network Security, 2011. 01, 1(2011): 10-16.

Google Scholar

[3] WALD R M. General relativity [M]. Chicago and London: University of Chicago Press, (1984).

Google Scholar

[4] LIU Liao, ZHAO Zheng. General relativity [M]. Beijing: Higher Education Press, (2004).

Google Scholar

[5] ZHAO Zheng. Difficult and Important Revelation of Black Hole Theory [J]. Nature magazine, 2006. 04, Vol. 28, No. 4, pp: 210-214.

Google Scholar

[6] M. Rosenblum, T. Garfinkel. 2005. Virtual machine monitors: Current technology and future trends [J]. IEEE Computer Society, 38(5): 39-47.

DOI: 10.1109/mc.2005.176

Google Scholar

[7] A. Mori, T. Izumida, T. Sawada, et al. 2006. A tool for analyzing and detecting malicious mobile code[C]. Shanghai, China. Inst. of Elec. and Elec. Eng. Computer Society. 831-834.

DOI: 10.1145/1134285.1134426

Google Scholar

[8] S. T. King, P. M. Chen, Y. -M. Wang, etal. 2006. SubVirt: Implementing malware with virtual machines[C]. Berkeley, United States. Institute of Electrical and Electronics Engineers Inc. 314-327.

Google Scholar

[9] ZHANG Yu, LI Tao, WU Li Hua, PENG Xiao Ning, QIN Ren Chao. Computer Virus Evolution Model and Its Analysis [J]. Journal of University of Electronic Science and Technology of China, 2009. 03, 3(38), pp: 419-422.

Google Scholar