{"title":"A Proactively Defensive Low-Level Decision Center Model of Endogenous Security","authors":"Liang Feilin, Li Tao, Hu Aiqu","doi":"10.1109/CSP55486.2022.00017","DOIUrl":null,"url":null,"abstract":"With the development of 5g and next-generation networks, shell-based defenses are becoming increasingly unsuitable and become a burden and obstacle to information systems. The endogenous security defense system based on the bionic mechanism has entered people's field of vision. On this basis, this paper proposes a spinal-like low-level decision center model in the endogenous security system. It uses fuzzy cognitive maps and trusted computing to comprehensively analyze the information of the system, and makes decisions based on the needs of applications and tasks. Some case studies and experimental results prove the effectiveness and efficiency of the model.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP55486.2022.00017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the development of 5g and next-generation networks, shell-based defenses are becoming increasingly unsuitable and become a burden and obstacle to information systems. The endogenous security defense system based on the bionic mechanism has entered people's field of vision. On this basis, this paper proposes a spinal-like low-level decision center model in the endogenous security system. It uses fuzzy cognitive maps and trusted computing to comprehensively analyze the information of the system, and makes decisions based on the needs of applications and tasks. Some case studies and experimental results prove the effectiveness and efficiency of the model.