基于人工免疫的信息系统安全风险评估模型

Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng
{"title":"基于人工免疫的信息系统安全风险评估模型","authors":"Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng","doi":"10.1109/EDT.2010.5496552","DOIUrl":null,"url":null,"abstract":"An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.","PeriodicalId":325767,"journal":{"name":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Artificial immunity-based model for information system security risk evaluation\",\"authors\":\"Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng\",\"doi\":\"10.1109/EDT.2010.5496552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.\",\"PeriodicalId\":325767,\"journal\":{\"name\":\"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDT.2010.5496552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDT.2010.5496552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

提出了一种基于人工免疫原理的信息系统安全风险评估模型。模拟免疫细胞对有害抗原的识别。定义了未成熟、成熟和记忆检测器。用数学方法推导了探测器的演化过程。建立了探测器识别威胁的数学模型。识别威胁的强度和信息系统中的脆弱性。通过威胁和漏洞,推导出安全风险的定量计算公式。理论分析表明,该模型为实时定量评价信息系统安全风险提供了一种新的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Artificial immunity-based model for information system security risk evaluation
An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Integrating mobility, multi-homing and security in universal network Notice of RetractionAgent-construction government investment project management new mode The building of harmony project management theoretical system Improvement of the mobile e-health wireless networks based on the IPv6 protocol Research of physical condition monitoring system for the elderly based on Zigbee wireless network technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1