{"title":"基于免疫危险理论的网络安全监控模型","authors":"Feixian Sun, Xinchao Han, Jianhong Wang","doi":"10.1109/CESCE.2010.158","DOIUrl":null,"url":null,"abstract":"In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is proposed in this paper. After introducing the back ground to the danger theory, a novel model for network security monitoring is presented. With the formal definitions of antigen, antibody, and detector improved, the computation method of affinity and danger signal are described. And then, the network attack monitoring algorithm is given. Theoretical analysis results show that the proposed model is feasible. Thus, it provides a good solution to the security assurance of computer information systems.","PeriodicalId":6371,"journal":{"name":"2010 International Conference on Challenges in Environmental Science and Computer Engineering","volume":"41 1","pages":"33-35"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"An Immune Danger Theory Inspired Model for Network Security Monitoring\",\"authors\":\"Feixian Sun, Xinchao Han, Jianhong Wang\",\"doi\":\"10.1109/CESCE.2010.158\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is proposed in this paper. After introducing the back ground to the danger theory, a novel model for network security monitoring is presented. With the formal definitions of antigen, antibody, and detector improved, the computation method of affinity and danger signal are described. And then, the network attack monitoring algorithm is given. Theoretical analysis results show that the proposed model is feasible. Thus, it provides a good solution to the security assurance of computer information systems.\",\"PeriodicalId\":6371,\"journal\":{\"name\":\"2010 International Conference on Challenges in Environmental Science and Computer Engineering\",\"volume\":\"41 1\",\"pages\":\"33-35\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Challenges in Environmental Science and Computer Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CESCE.2010.158\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Challenges in Environmental Science and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CESCE.2010.158","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Immune Danger Theory Inspired Model for Network Security Monitoring
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for network security monitoring is proposed in this paper. After introducing the back ground to the danger theory, a novel model for network security monitoring is presented. With the formal definitions of antigen, antibody, and detector improved, the computation method of affinity and danger signal are described. And then, the network attack monitoring algorithm is given. Theoretical analysis results show that the proposed model is feasible. Thus, it provides a good solution to the security assurance of computer information systems.