Artificial Immune Danger Theory Based Model for Network Security Evaluation

Inspired by the principles of immune danger theory, a danger theory based model for network security risk assessment is presented in this paper. Firstly, the principle of the danger theory is introduced. And then, with the improved concepts and formal definitions of antigen, antibody, danger signal, and detection lymphocyte for network security risk assessment presented , the distributed architecture of the proposed model is described . Following that, the principle of network intrusion detection is expounded. Finally, the method of network security risk assessment is given . Theoretical analysis and simulation results show that the proposed model can evaluate the network attack threats in real time. Thus, it provides an effective risk evaluation solution to network security.

[1]  Uwe Aickelin,et al.  Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.

[2]  Liu Nian,et al.  Research on Network Security Situation Awareness Technology Based on Artificial Immunity System , 2009, 2009 International Forum on Information Technology and Applications.

[3]  Feixian Sun,et al.  An Immune Danger Theory Inspired Model for Network Security Threat Awareness , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[4]  Feng Xu,et al.  Antibody Concentration Based Method for Network Security Situation Awareness , 2009, 2009 3rd International Conference on Bioinformatics and Biomedical Engineering.

[5]  Dipankar Dasgupta,et al.  Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[6]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[7]  Joseph L. Kirschvink,et al.  Late Cenozoic high-resolution magnetostratigraphy in the Kunlun Pass Basin and its implications for the uplift of the northern Tibetan Plateau , 2005 .

[8]  Erica Klarreich,et al.  Inspired by immunity , 2002, Nature.

[9]  Du Hai-feng,et al.  A noval algorithm of artificial immune system for high-dimensional function numerical optimization∗ , 2005 .

[10]  Mohd Aizaini Maarof,et al.  Polymorphism and Danger Susceptibility of System Call DASTONs , 2005, ICARIS.

[11]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[12]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[13]  Jonathan Timmis,et al.  Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..

[14]  Feixian Sun,et al.  An Immune Danger Theory Inspired Model for Network Security Monitoring , 2010, 2010 International Conference on Challenges in Environmental Science and Computer Engineering.

[15]  Yu Zhang,et al.  A Dynamic Immunity-Based Model for Computer Virus Detection , 2008, 2008 International Symposiums on Information Processing.

[16]  Alex A. Freitas,et al.  Towards a Danger Theory Inspired Artificial Immune System for Web Mining , 2005 .

[17]  Jinquan Zeng,et al.  Gene-Certificate Based Method for Network Trust , 2008, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering.

[18]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[19]  Chuankun Wu,et al.  Construction and enumeration of Boolean functions with maximum algebraic immunity , 2009, Science in China Series F: Information Sciences.

[20]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[21]  Anne N. De Roeck,et al.  Multimodal Dynamic Optimization: From Evolutionary Algorithms to Artificial Immune Systems , 2007, ICARIS.

[22]  P. Matzinger,et al.  Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.

[23]  Du Hai-feng,et al.  Optimal approximation of linear systems by artificial immune response , 2006 .

[24]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[25]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[26]  Feixian Sun,et al.  Immunity-Based Dynamic Anomaly Detection Method , 2008, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering.

[27]  Feixian Sun,et al.  A New Risk Assessment Model for E-Government Network Security Based on Antibody Concentration , 2009, 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government.

[28]  Yu Zhang,et al.  A Novel Biology-Inspired Virus Detection Model with RVNS , 2008, ISICA.

[29]  Fei-xian Sun,et al.  Immunity-Inspired Risk Assessment Approach for Network Security , 2009, 2009 International Conference on Web Information Systems and Mining.

[30]  Peter Ross,et al.  Improving SOSDM: Inspirations from the Danger Theory , 2003, ICARIS.

[31]  Yiwen Liang,et al.  A Novel Intrusion Detection Model Based on Danger Theory , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[32]  Tao Li,et al.  Dynamic detection for computer virus based on immune system , 2008, Science in China Series F: Information Sciences.

[33]  Liu Nian The Research of Network Intrusion Detection Based on Immune Danger Theory , 2006 .

[34]  Tao Li,et al.  An immune based dynamic intrusion detection model , 2005 .

[35]  Feixian Sun,et al.  A Gene Technology Inspired Paradigm for User Authentication , 2009, 2009 3rd International Conference on Bioinformatics and Biomedical Engineering.