{"title":"基于人工免疫的信息系统安全风险评估模型","authors":"Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng","doi":"10.1109/EDT.2010.5496552","DOIUrl":null,"url":null,"abstract":"An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Artificial immunity-based model for information system security risk evaluation\",\"authors\":\"Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng\",\"doi\":\"10.1109/EDT.2010.5496552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.\",\"PeriodicalId\":325767,\"journal\":{\"name\":\"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDT.2010.5496552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDT.2010.5496552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Artificial immunity-based model for information system security risk evaluation
An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.