外文原文-基于免疫的网络安全风险评估.pdf
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外文 原文 基于 免疫 网络安全 风险 评估
- 资源描述:
-
1、Science in China Ser.F Information Sciences 2005 Vol.48 No.5 557?578 557 An immunity based network security risk estimation LI Tao Department of Computer Science,Sichuan University,Chengdu 610065,China(email:)Received March 9,2004;revised July 10,2005 Abstract According to the relationship between t
2、he antibody concentration and the pathogen intrusion intensity,here we present an immunity-based model for the network security risk estimation(Insre).In Insre,the concepts and formal definitions of self,nonself,antibody,antigen and lymphocyte in the network security domain are given.Then the mathem
3、atical models of the self-tolerance,the clonal selection,the lifecycle of mature lymphocyte,immune memory and immune surveillance are established.Building upon the above models,a quantitative computation model for network security risk estimation,which is based on the calculation of antibody concent
4、ration,is thus presented.By using Insre,the types and intensity of network attacks,as well as the risk level of network security,can be calculated quantitatively and in real-time.Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the
5、 network security.Keywords:artificial immune system,intrusion detection,network security,risk estimation.DOI:10.1360/04yf0140 There are two kinds of risk-estimation methods for the network security:static and real-time.The static methods estimate the network risk through statically evaluating the ne
6、twork value,security holes,and the occurring frequency of security events1,e.g.,COBRA1),OCTAVE2,etc.Focusing on the static factors of the target system,the static methods can only make a rough estimation of the security risk that the network faced in the past,and cannot in real-time evaluate the ris
7、k of network attacks that the network is vulnerable to.Moreover,they have little ability to detect new coming network attacks,and thus they offer no self-adaptation capability to the complex environment of the net-work security3.In contrast with the research on the static risk-estimation,the researc
8、h on the real-time risk-evaluation for the network security is still in a groping phase and only limited stud-1)COBRA:Introduction to Risk Analysis.C&A Systems Security Ltd.http:/www.ca-systems.zetnet.co.uk/risk.htm Copyright by Science in China Press 2005 558 Science in China Ser.F Information Scie
展开阅读全文
图海文库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。


f1阀门井大样CAD图.dwg
基于S7-200PLC步进电机调速控制—步进驱动控制系统设计(CAD图纸+说明书).zip

