Danger Theory Based Model for Network Security Risk Assessment

Article Preview

Abstract:

Inspired by the principles of immunity, a danger theory based model for network security risk assessment is proposed. After introducing the principle of the danger theory and with the improved concepts and formal definitions presented, the model architecture is described. And then, the methods of network intrusion detection and security risk assessment are given. Theoretical analysis and simu-lation results show that the proposed model can evaluate the network attack in real-time. Thus, it provides an effective risk assessment solution to network security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

148-154

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Hofmeyr and S. Forrest: Evol. Comp., Vol. 8 (2000), pp.443-473.

Google Scholar

[2] E. Klarreich: Nature, Vol. 415 (2002), pp.468-470.

Google Scholar

[3] L. D. Castro and J. Timmis: Soft Comp. Vol. 7 (2003), pp.526-544.

Google Scholar

[4] F. Sun and S. Zhang, in: Proc. of the 2009 International Conference on Web Information Systems and Mining (2009), pp.515-518.

Google Scholar

[5] F. Sun and F. Xu, in: Proc. of the 3rd International Conference on Bioinformatics and Biomedical Engineering, Vol. 1 (2009), pp.1-4.

Google Scholar

[6] T. Li: Chinese Sci. Bull., Vol. 50(2005), p.1912-(1919).

Google Scholar

[7] F. Sun, Q. Zheng and T. Li, in: Proc. of the 2nd International Conference on Bioinformatics and Biomedical Engineering, Vol. 1 (2008), pp.644-647.

Google Scholar

[8] T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.

Google Scholar

[9] P. Matzinger: Annu. Rev. Immunol., Vol. 12 (1994), pp.991-1045.

Google Scholar

[10] P. Matzinger: Sc. & J. Immunol., Vol. 54 (2001), pp.4-9.

Google Scholar

[11] P. Matzinger: Science, Vol. 12 (2002), pp.301-305.

Google Scholar

[12] U. Aickelin and S. Cayzer, in: Proc. of the 1st International Conference on Artificial Immune Systems (2002), pp.141-148.

Google Scholar

[13] J. Timmis, P. Bentley and E. Hart: Lect. Notes Comput. Sc., Vol. 2787 (2003), pp.194-203.

Google Scholar

[14] Secker, and A. Freitas, in: Web Mining: applications and techniques (2005), pp.145-168.

Google Scholar

[15] J. Zhang and Y. Liang, in: Proc. of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp.867-871.

Google Scholar

[16] F. Sun, M. Kong and J. Wang, in: Proc. Of the 2010 Second International Conference on Multimedia and Information Technology, Vol. 2 (2010), pp.93-95.

Google Scholar

[17] F. Sun, X. Han and J. Wang, in: Proc. Of the 2010 International Conference on Challenges in Environmental Science and Computer Engineering, Vol. 2 (2010), pp.33-35.

Google Scholar