ImageVerifierCode 换一换
格式:PDF , 页数:22 ,大小:564.45KB ,
资源ID:22150      下载积分:10 金币
验证码下载
登录下载
邮箱地址:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱地址,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝   
验证码:   换一换

 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.thwenku.com/down/22150.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  
下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(外文原文-基于免疫的网络安全风险评估.pdf)为本站会员主动上传,图海文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知图海文库(发送邮件至admin@thwenku.com或直接QQ联系客服),我们立即给予删除!

外文原文-基于免疫的网络安全风险评估.pdf

1、Science in China Ser.F Information Sciences 2005 Vol.48 No.5 557?578 557 An immunity based network security risk estimation LI Tao Department of Computer Science,Sichuan University,Chengdu 610065,China(email:)Received March 9,2004;revised July 10,2005 Abstract According to the relationship between t

2、he antibody concentration and the pathogen intrusion intensity,here we present an immunity-based model for the network security risk estimation(Insre).In Insre,the concepts and formal definitions of self,nonself,antibody,antigen and lymphocyte in the network security domain are given.Then the mathem

3、atical models of the self-tolerance,the clonal selection,the lifecycle of mature lymphocyte,immune memory and immune surveillance are established.Building upon the above models,a quantitative computation model for network security risk estimation,which is based on the calculation of antibody concent

4、ration,is thus presented.By using Insre,the types and intensity of network attacks,as well as the risk level of network security,can be calculated quantitatively and in real-time.Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the

5、 network security.Keywords:artificial immune system,intrusion detection,network security,risk estimation.DOI:10.1360/04yf0140 There are two kinds of risk-estimation methods for the network security:static and real-time.The static methods estimate the network risk through statically evaluating the ne

6、twork value,security holes,and the occurring frequency of security events1,e.g.,COBRA1),OCTAVE2,etc.Focusing on the static factors of the target system,the static methods can only make a rough estimation of the security risk that the network faced in the past,and cannot in real-time evaluate the ris

7、k of network attacks that the network is vulnerable to.Moreover,they have little ability to detect new coming network attacks,and thus they offer no self-adaptation capability to the complex environment of the net-work security3.In contrast with the research on the static risk-estimation,the researc

8、h on the real-time risk-evaluation for the network security is still in a groping phase and only limited stud-1)COBRA:Introduction to Risk Analysis.C&A Systems Security Ltd.http:/www.ca-systems.zetnet.co.uk/risk.htm Copyright by Science in China Press 2005 558 Science in China Ser.F Information Scie

9、nces 2005 Vol.48 No.5 557?578 ies are available.In 1997,Jonsson and Olovsson4 analyzed the attacker behavior based on Markov model,and estimated the system reliability according to the probability that the system was breached by the attackers.In 1999,Ortalo et al.5 proposed a security hole evaluatio

10、n method based on the privilege graph for the known security vulnerabili-ties in UNIX.In 2002,Madan et al.6 presented a state transition model to depict the system states when the system suffered from network intrusions,and then proposed a method to evaluate the security holes and reliability.In 200

11、4,Chu et al.7 presented a method between the static and real-time evaluation for the network security.This model can roughly estimate the network security according to some simple sudden-change events,such as the change of operating conditions,the loss of components,and etc.The above methods mainly

12、aim at the evaluation for network reliability according to the probability or time cost that the known security holes were breached by the attackers.However,they cannot correctly evaluate the system risk that the network is facing.For example,they cannot estimate the risk that the network is facing

13、but not breached,and can do nothing about DDoS attacks.Furthermore,they cannot effectively distinguish the different kinds of intrusions,and have no detecting ability for the unknown intrusions.As a result,the effectiveness and real-time ability of these methods cannot satisfy the requirements of th

14、e network security risk estimation in the real network environment.There is actually a direct analogy between the computer network security and the biological immune system(BIS)in a human body.Both have to maintain stability in a changing environment8?13.In 1958,Burnet14 presented the Clonal Selecti

15、on Theory,which first expounded the characteristics of immune response:only the cells activated by antigens can carry out the clonal procedure.In 1993,Kepler and Perelson15 devel-oped the Clonal Selection Theory,and discussed the Somatic Hypermutation Theory,which is an important variation in the cl

16、onal selection.In 1994,Forrest et al.16 proposed Negative Selection Algorithm(NSA).Later,Hofmeyr and Forrest et al.17?19 presented a general framework for Artificial Immune System(AIS),and built a Computer Immune System(CIS)based on ARTIS,which is called LISYS and has greatly promoted the re-search of CIS.ARTIS has made a great impact on CIS researches.For example,using mobile-agents to monitor the network activities,Dasgupta and Harmer et al.20,21 built an agent-based CIS architecture upon ARTI

网站客服QQ:2356858848

  客服联系电话:18503783681

copyright@ 2008-2022 thwenku网站版权所有

ICP备案:豫ICP备2022023751号-1


>


客服