It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Artificial Immune Danger Theory Based Model for Network Security Evaluation | Sun | Journal of Networks
Journal of Networks, Vol 6, No 2 (2011), 255-262, Feb 2011
doi:10.4304/jnw.6.2.255-262

Artificial Immune Danger Theory Based Model for Network Security Evaluation

Feixian Sun

Abstract


Inspired by the principles of immune danger theory, a danger theory based model for network security risk assessment is presented in this paper. Firstly, the principle of the danger theory is introduced. And then, with the improved concepts and formal definitions of antigen, antibody, danger signal, and detection lymphocyte for network security risk assessment presented, the distributed architecture of the proposed model is described. Following that, the principle of network intrusion detection is expounded. Finally, the method of network security risk assessment is given. Theoretical analysis and simulation results show that the proposed model can evaluate the network attack threats in real time. Thus, it provides an effective risk evaluation solution to network security.


Keywords


artificial immunity; danger theory; network security evaluation

References


[1] S. Forrest, S. Hofmeyr, and A. Somayaji, “Computer immunology”, Communications of the ACM, vol. 40, pp. 88-96, October 1997.
doi:10.1145/262793.262811

[2] S. Hofmeyr, and S. Forrest, “Immunity by design: an artificial immune system,” Proc. of the Genetic Evolutionary Computation Conference, IEEE Press, pp. 1289-1296, 1999.

[3] S. Hofmeyr, and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, vol. 8, pp. 443-473, 2000.
doi:10.1162/106365600568257
PMid:11130924

[4] E. Klarreich, “Inspired by immunity,” Nature, vol. 415, pp. 468-470, January 2002.
doi:10.1038/415468a
PMid:11823823

[5] L. De Castro, and J. Timmis, “Artificial immune systems as a novel soft computing paradigm,” Soft Computing, vol. 7, pp. 526-544, 2003.
doi:10.1007/s00500-002-0237-z

[6] H. F. Du, M. Gong, L. Jiao, and R. Liu, “A novel artificial immune system algorithm for high-dimensional function numerical optimization,” Progress in Nature Science, vol. 15, pp. 463-471, 2005.
doi:10.1080/10020070512331342410

[7] F. Sun, and S. Zhang, “Immunity-inspired risk assessment approach for network security”. Proc. of the 2009 International Conference on Web Information Systems and Mining (WISM'09), pp. 515-518, 2009.
doi:10.1109/WISM.2009.110

[8] F. Sun, and F. Xu, “Antibody concentration based method for network security situation awareness,” Proc. of the 3nd International Conference on Bioinformatics and Biomedical Engineering (iCBBE 2009), IEEE Press, vol. 1, pp. 1-4, 2009.

[9] N. Liu, D. Wang, and X. huang, "Research on network security situation awareness technology based on artificial immunity system," Proc. of the 2009 International Forum on Information Technology and Applications (IFITA 2009), IEEE Press, vol. 1, pp. 472-475, 2009.

[10] T. Li, “An immune based dynamic intrusion detection model,” Chinese Science Bulletin, vol. 50(17), pp. 1912-1919, 2005.

[11] D. Dasgupta, “Immunity-based intrusion detection system: a general framework,” Proc. of the 22nd National Information Systems Security Conference (NISSC), http://issrl.cs.memphis.edu/nissc-99.pdf, October 18-21, 1999.

[12] F. Sun, Q. Zheng, and T. Li, “Immunity-based dynamic anomaly detection method,” Proc. of the 2nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2008), IEEE Press, Vol. 1, pp. 644-647, 2008.

[13] T. Li, “Dynamic detection for computer virus based on immune system,” Science in China, Series F: Information Science, vol. 51, pp.1475-1486, 2008.
doi:10.1007/s11432-008-0125-y

[14] Y. Zhang, T. Li, and R. Qin, “A dynamic immunity-based model for computer virus detection, ” Proc. of International Symposiums on Information Processing, Vol. 1, pp. 515-519, 2008.
doi:10.1109/ISIP.2008.129

[15] R. Qin, T. Li, Y. Zhang, “A novel biology-inspired virus detection model with RVNS, ” Lecture Notes In Computer Science, Vol. 5370, pp.446-453, 2008. Proc. of the 3rd International Symposium on Advances in Computation and Intelligence.

[16] M. G. Gong, H. F. Du, and L. C. Jiao, “Optimal approximation of linear systems by artificial immune response,” Science in China Ser. F Information Science, vol. 49, pp. 63-79, January 2006.
doi:10.1007/s11432-005-0314-x

[17] N. Nanas, and A. De Roeck, “Multimodal dynamic optimization: from evolutionary algorithms to artificial immune systems,” Lecture Notes in Computer Science, vol. 4628, pp. 13-24, August 2007.
doi:10.1007/978-3-540-73922-7_2

[18] F. Sun, Q. Zheng, T. Li, “Immunity-based dynamic anomaly detection method,” Proc. of the 2nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2008), IEEE Press, Vol. 1, pp. 644–647, May 2008.

[19] F. Sun, L. Pan, T. Li, J. Zeng, “Gene-certificate based method for network trust, ” Proc. of the 2nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2008), IEEE Press, Vol. 1, pp. 1769-1772, May 2008.

[20] F. Sun, S. Cheng, “A gene technology inspired paradigm for user authentication,” Proc. of the 3nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2009), IEEE Press, pp. 1-3, June 2009.

[21] W. Zhang, C. Wu, and X. Liu, “Construction and enumeration of Boolean functions with maximum algebraic immunity,” Science In China, Series F: Information Science, vol. 52, pp.32-40, January 2009.
doi:10.1007/s11432-009-0007-y

[22] F. Sun, and Z. Wu, “A new risk assessment model for e-Government network security based on antibody concentration,” Proc. of the 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government. pp. 119-121, December 2009.

[23] F. Sun, and S. Zhang, “Immunity-inspired risk assessment approach for network security,” Proc. of the 2009 International Conference on Web Information Systems and Mining. pp. 515-518, November 2009.
doi:10.1109/WISM.2009.110

[24] P. Matzinger, “Tolerance, danger and the extended family,”Annual Reviews in Immunology, vol. 12, pp. 991–1045, 1994
PMid:8011301

[25] P. Matzinger, “The danger model in its historieal contex,” Scandinavian Journal of Immunology, vol. 54, pp. 4-9, 2001.
doi:10.1046/j.1365-3083.2001.00974.x
PMid:11439142

[26] P. Matzinger, “The danger model: a renewed sense of self, ” Science, vol. 12, pp. 301-305, 2002.
doi:10.1126/science.1071059
PMid:11951032

[27] U. Aickelin, and S. Cayzer, “The danger theory and its application to artificial immune systems,” Proc. of the lst International Conference on Artificial Immune Systems (ICARIS-2002), pp. 141-148, 2002.

[28] J. Timmis,P. Bentley, and E. Hart, “Improving SOSDM: inspirations from the danger theory,” Proc. of the 2nd International Conference on Artificial Immune Systems (ICARIS-2003),Springer LNCS 2787, pp. 194–203, 2003.

[29] A. Secker, A. Freitas, and J. Timmis, “Towards a danger theory inspired artificial immune system for Web mining,” Web Mining: applications and techniques,pp. 145-168, 2005

[30] A. Iqbal, and M. Maarof, “Polymorphism and danger susceptibility of system call DASTONs,” Proc. of the 3rd International Conference on Artificial Immune Systems (ICARIS-2005), Springer LNCS 3627, pp. 366-374, 2005.

[31] J. Kim, W. Wilson, U. Aickelin, and J. McLeod, “Cooperative automated worm response and detection immune algorithm (CARD INAL) inspired by T-cell immunity and tolerance,” Proc. of the 3rd International Conference on Artificial Immune Systems (ICARIS-2005), Springer LNCS 3627, pp. 168-181, 2005.

[32] C. Xu, T. Li, S. Liu, H. Zhao, J. Zhang, and N. Liu, “The research of network intrusion detection based on immune danger theory, ” Journal of Nanjing University of Posts and Telecommunications: Natural Science, vol. 26, pp. 80-85, 2006

[33] J. Zhang, and Y. Liang, “A novel intrusion detection model based on danger theory,” Proc. of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp. 867-871, 2008.
doi:10.1109/PACIIA.2008.283

[34] F. Sun, M. Kong, and J. Wang, “An immune danger theory inspired model for network security threat awareness,” Proc. Of the 2010 Second International Conference on Multimedia and Information Technology, vol. 2, pp.93-95, 2010.

[35] F. Sun, X. Han, J. Wang, “An immune danger theory inspired model for network security monitoring,” Proc. Of the 2010 International Conference on Challenges in Environmental Science and Computer Engineering (CESCE 2010), vol. 2, pp. 33-35, 2010.

[36] T. Li, “An immunity based network security risk estimation,” Science in China Ser. F Information Science, vol. 48, pp. 557-578, 2005.
doi:10.1360/04yf0140


Full Text: PDF


Journal of Networks (JNW, ISSN 1796-2056)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.