A Danger Theory Inspired Security Evaluation Paradigm for Computer Network

Article Preview

Abstract:

Inspired by the potential interesting ideas of the danger theory, a novel security evaluation paradigm for network security, it is called DTPSE, is proposed in this paper. Within DTPSE, computer network attacks are regarded as bacterium, which are dangerous, and induce danger signals through simulating cells undergoing injury, or stress or 'bad cell death'; the network evaluation centre can dynamically aware the security risk by fusion the danger signals received from host-based sensors. Theoretical analysis shows that the proposed paradigm is feasible. Thus, it provides a novel solution to information security risk assessment.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 179-180)

Pages:

1333-1337

Citation:

Online since:

January 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. Klarreich: Nature, Vol. 415 (2002), pp.468-470.

Google Scholar

[2] S. Hofmeyr and S. Forrest: Evol. Comp., Vol. 8 (2000), pp.443-473.

Google Scholar

[3] L. D. Castro and J. Timmis: Soft Comp. Vol. 7 (2003), pp.526-544.

Google Scholar

[4] F. Sun, Q. Zheng and T. Li, in: Proc. of the 2nd International Conference on Bioinformatics and Biomedical Engineering, Vol. 1 (2008), pp.644-647.

Google Scholar

[5] Z. Chen: Key Engineering Materials, Vol. 439-440(2010), pp.29-34.

Google Scholar

[6] T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.

Google Scholar

[7] F. Sun and F. Xu, in: Proc. of the 3rd International Conference on Bioinformatics and Biomedical Engineering, Vol. 1 (2009), pp.1-4.

Google Scholar

[8] F. Sun and S. Zhang, in: Proc. of the 2009 International Conference on Web Information Systems and Mining (2009), pp.515-518.

Google Scholar

[9] P. Matzinger: Sc. & J. Immunol., Vol. 54 (2001), pp.4-9.

Google Scholar

[10] P. Matzinger: Science, Vol. 12 (2002), pp.301-305.

Google Scholar

[11] M. Elsadig, A. Abdullah and B. Samir, In: Proc. of the 2nd International Conference on Computer and Automation Engineering, Vol. 5 (2010), pp.843-846.

Google Scholar

[12] X. Huang, S. Li and L. Huang, in: Proc. of the 2010 International Conference on Biomedical Engineering and Computer Science, (2010).

Google Scholar

[13] F. Sun and L. Gao, in Proc. of the 2010 ETP/IITA Conference on System Science and Simulation in Engineering, (2010), pp.62-65.

Google Scholar

[14] L. Peng, Z. Li, J. Zeng and et al., in Proc. of the Workshop on Intelligent Information Technology Application, (2007), pp.87-90.

Google Scholar

[15] F. Sun, M. Kong and J. Wang, in: Proc. of the 2010 Second International Conference on Multimedia and Information Technology, Vol. 2 (2010), pp.93-95.

Google Scholar

[16] F. Sun, X. Han and J. Wang, in: Proc. Of the 2010 International Conference on Challenges in Environmental Science and Computer Engineering, Vol. 2 (2010), pp.33-35.

Google Scholar