A Network Security Risk Assessment Method Based on Immunity Algorithm

Article Preview

Abstract:

Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security assessment method based on Immunity algorithm. It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities, and to check hosts’ security effectively as well. It has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 108-111)

Pages:

948-953

Citation:

Online since:

May 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] F. Sun, and F. Xu, Antibody concentration based method for network security situation awareness, Proc. The 3nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2009), IEEE Press, vol. 1, pp.130-134, June (2009).

DOI: 10.1109/icbbe.2009.5162372

Google Scholar

[2] T. Li, Dynamic detection for computer virus based on immune system, Science In China, Series F: Information Science, vol. 51, pp.1475-1486, October (2008).

DOI: 10.1007/s11432-008-0125-y

Google Scholar

[3] N. Nanas, and A. De Roeck, Multimodal dynamic optimization: from evolutionary algorithms to artificial immune systems, Lecture Notes in Computer Science, vol. 4628, pp.13-24, August (2007).

DOI: 10.1007/978-3-540-73922-7_2

Google Scholar

[4] M. G. Gong, H. F. Du, and L. C. Jiao, Optimal approximation of linear systems by artificial immune response, Science in China Ser. F Information Science, vol. 49, pp.63-79, January (2006).

DOI: 10.1007/s11432-005-0314-x

Google Scholar

[5] T. Li, An immunity based network security risk estimation, Science in China Ser. F Information Science, vol. 48, pp.557-578, May (2005).

Google Scholar

[6] H. F. Du, M. G. Gong, L. C. Jiao, and R. C. Liu, A novel artificial immune system algorithm for high-dimensional function numerical optimization, Progress in Nature Science, vol. 15, pp.463-471, May (2005).

Google Scholar

[7] L. N. De Castro, and J. I. Timmis, Artificial immune systems as a novel soft computing paradigm, Soft Computing, vol. 7, pp.526-544, August (2003).

DOI: 10.1007/s00500-002-0237-z

Google Scholar

[8] S. A. Hofmeyr, and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, vol. 8, pp.443-473, Winter (2000).

DOI: 10.1162/106365600568257

Google Scholar

[9] S. Hofmeyr, and S. Forrest, Immunity by design: an artificial immune system, in Genetic Evolutionary Computation Conf., San Francisco, CA: IEEE Press, pp.1289-1296, (1999).

Google Scholar

[10] S. Forrest, S. Hofmeyr, and A. Somayaji, Computer immunology, Communications of the ACM, vol. 40, pp.88-96, October (1997).

DOI: 10.1145/262793.262811

Google Scholar