期刊文献+

An immunity based network security risk estimation 被引量:30

An immunity based network security risk estimation
原文传递
导出
摘要 According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunitybased model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self, nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the selftolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation, which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security. According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunitybased model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self, nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the selftolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation, which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security.
作者 LI Tao
出处 《Science in China(Series F)》 2005年第5期557-578,共22页 中国科学(F辑英文版)
基金 the National Natural Science Foundation of China(Grant No 60373110) Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No 20030610003) New Century Excellent Expert Program of Ministry of Ed ucation of China(Grant No 20030610003) the Innovation Foundation of Sichuan University(Grant No.2004CF10).
关键词 artificial immune system intrusion detection network security risk estimation artificial immune system, intrusion detection, network security, risk estimation
  • 相关文献

参考文献2

二级参考文献114

  • 1戴汝为,王珏.关于智能系统的综合集成[J].科学通报,1993,38(14):1249-1256. 被引量:52
  • 2戴汝为,王珏.巨型智能系统的探讨[J].自动化学报,1993,19(6):645-655. 被引量:39
  • 3陆德源.现代免疫学[M].上海:上海科学技术出版社,1998.14-16. 被引量:8
  • 4学科交叉和技术应用专门小组(美).学科交叉和技术应用[R].北京:科学出版社,1994.43. 被引量:1
  • 5HanJiawei Kamber M 范明等译.数据挖掘:概念与技术[M].北京:机械工业出版社,2001.. 被引量:6
  • 6M N O Sadiku. Artificial Intelligence [ J ]. IEEE Potentials, 1989, 8(2) :35 - 39. 被引量:1
  • 7R J Patton, C J Lopez-Toribio, F J Uppal. Artificial intelligence approaches to fault diagnosis[ A]. IEE Colloquium on Condition Monitoring :Machinety, External Structures and Health (Ref. No. 1999/034)[ C]. London:The Institute of Electrical Eagineers, 1999.5/1 - 5/18. 被引量:1
  • 8R Orwig, H Chen, D Vogel, et al. A multi-agent view of strategic planning using group support systems and artificial intelligence [J]. Group Decision and Negotiation, 1997,6( 1 ) : 37 - 59. 被引量:1
  • 9A Christopher, Welty, G Peter, Selfridge. Artificial intelligence and software engineering: Breaking the toy mold [ J ]. Automated Software Engineering. 1997,4(3) :255 - 270. 被引量:1
  • 10Donald Gillies. Book review: Artificial intelligence and scientific method [ J]. Journal of Intelligent and Robotic Systems. 1998,22( 1 ) :87-95. 被引量:1

共引文献391

同被引文献270

引证文献30

二级引证文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部