外文原文-基于免疫的网络安全风险评估.pdf

文档编号:22150 上传时间:2024-03-25 格式:PDF 页数:22 大小:564.45KB
下载 相关 举报
外文原文-基于免疫的网络安全风险评估.pdf_第1页
第1页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第2页
第2页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第3页
第3页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第4页
第4页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第5页
第5页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第6页
第6页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第7页
第7页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第8页
第8页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第9页
第9页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第10页
第10页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第11页
第11页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第12页
第12页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第13页
第13页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第14页
第14页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第15页
第15页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第16页
第16页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第17页
第17页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第18页
第18页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第19页
第19页 / 共22页
外文原文-基于免疫的网络安全风险评估.pdf_第20页
第20页 / 共22页
亲,该文档总共22页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、Science in China Ser.F Information Sciences 2005 Vol.48 No.5 557?578 557 An immunity based network security risk estimation LI Tao Department of Computer Science,Sichuan University,Chengdu 610065,China(email:)Received March 9,2004;revised July 10,2005 Abstract According to the relationship between t

2、he antibody concentration and the pathogen intrusion intensity,here we present an immunity-based model for the network security risk estimation(Insre).In Insre,the concepts and formal definitions of self,nonself,antibody,antigen and lymphocyte in the network security domain are given.Then the mathem

3、atical models of the self-tolerance,the clonal selection,the lifecycle of mature lymphocyte,immune memory and immune surveillance are established.Building upon the above models,a quantitative computation model for network security risk estimation,which is based on the calculation of antibody concent

4、ration,is thus presented.By using Insre,the types and intensity of network attacks,as well as the risk level of network security,can be calculated quantitatively and in real-time.Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the

5、 network security.Keywords:artificial immune system,intrusion detection,network security,risk estimation.DOI:10.1360/04yf0140 There are two kinds of risk-estimation methods for the network security:static and real-time.The static methods estimate the network risk through statically evaluating the ne

6、twork value,security holes,and the occurring frequency of security events1,e.g.,COBRA1),OCTAVE2,etc.Focusing on the static factors of the target system,the static methods can only make a rough estimation of the security risk that the network faced in the past,and cannot in real-time evaluate the ris

7、k of network attacks that the network is vulnerable to.Moreover,they have little ability to detect new coming network attacks,and thus they offer no self-adaptation capability to the complex environment of the net-work security3.In contrast with the research on the static risk-estimation,the researc

8、h on the real-time risk-evaluation for the network security is still in a groping phase and only limited stud-1)COBRA:Introduction to Risk Analysis.C&A Systems Security Ltd.http:/www.ca-systems.zetnet.co.uk/risk.htm Copyright by Science in China Press 2005 558 Science in China Ser.F Information Scie

9、nces 2005 Vol.48 No.5 557?578 ies are available.In 1997,Jonsson and Olovsson4 analyzed the attacker behavior based on Markov model,and estimated the system reliability according to the probability that the system was breached by the attackers.In 1999,Ortalo et al.5 proposed a security hole evaluatio

10、n method based on the privilege graph for the known security vulnerabili-ties in UNIX.In 2002,Madan et al.6 presented a state transition model to depict the system states when the system suffered from network intrusions,and then proposed a method to evaluate the security holes and reliability.In 200

11、4,Chu et al.7 presented a method between the static and real-time evaluation for the network security.This model can roughly estimate the network security according to some simple sudden-change events,such as the change of operating conditions,the loss of components,and etc.The above methods mainly

12、aim at the evaluation for network reliability according to the probability or time cost that the known security holes were breached by the attackers.However,they cannot correctly evaluate the system risk that the network is facing.For example,they cannot estimate the risk that the network is facing

13、but not breached,and can do nothing about DDoS attacks.Furthermore,they cannot effectively distinguish the different kinds of intrusions,and have no detecting ability for the unknown intrusions.As a result,the effectiveness and real-time ability of these methods cannot satisfy the requirements of th

14、e network security risk estimation in the real network environment.There is actually a direct analogy between the computer network security and the biological immune system(BIS)in a human body.Both have to maintain stability in a changing environment8?13.In 1958,Burnet14 presented the Clonal Selecti

15、on Theory,which first expounded the characteristics of immune response:only the cells activated by antigens can carry out the clonal procedure.In 1993,Kepler and Perelson15 devel-oped the Clonal Selection Theory,and discussed the Somatic Hypermutation Theory,which is an important variation in the cl

16、onal selection.In 1994,Forrest et al.16 proposed Negative Selection Algorithm(NSA).Later,Hofmeyr and Forrest et al.17?19 presented a general framework for Artificial Immune System(AIS),and built a Computer Immune System(CIS)based on ARTIS,which is called LISYS and has greatly promoted the re-search of CIS.ARTIS has made a great impact on CIS researches.For example,using mobile-agents to monitor the network activities,Dasgupta and Harmer et al.20,21 built an agent-based CIS architecture upon ARTI

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 文档资料

网站客服QQ:2356858848

  客服联系电话:18503783681

copyright@ 2008-2022 thwenku网站版权所有

ICP备案:豫ICP备2022023751号-1


>


客服