Abstract
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency of our model have been demonstrated theoretically, and practically.
Similar content being viewed by others
References
Forrest S., Hofmeyr S.A., Somayaji A.: Computer immunology. Commun. ACM 40(10), 88–96 (1997). doi:10.1145/262793.262811
Kephart, J.O.: A biologically inspired immune system for computers. In: Proceedings of the Fourth International Workshop On the Synthesis and Simulation of Living Systems and Artificial Life, pp. 130–139 (1994)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., et al: A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120–128. IEEE Computer Society Press, (1996)
Sima, Y.R., Liang, Y.W., et al.: The lymphocyte evolution approach of digital sequence antigen. Computer Engineering and Application, pp. 70–72 (2003)
MAO X.Y., Liang Y.W.: Research on the model of immune firewall. Comput. Eng. 25(8), 1282–1285 (2004)
Bradley, D.W., Ortega-sanchez, C., Tyrrell, A.M., et al.: Embryonics + immunotronics: a bio-inspired approach to fault tolerance. In: Proceedings of the Second NASA/DoD Workshop on Evolvable Hardware (2000)
Wang H.Q., Zheng R.J., Li X.Y., Liu D.X.: A bio-inspired multidimensional network Security model. Proc. IMSCCS (2), 3–7 (2006)
Wu, H.Y., Qi, L.: Research on security protection architecture of campus network system. http://www.cic.tsinghua.edu.cn/download.jsp?attachSeq=435
Zheng, R.J., Wang, H.Q.: Study on bio-inspired TNP implementation structure of BMNSM. The Sixth World Congress on Intelligent Control and Automation, DaLian, China IEEE: ThP2.255 (2006)
Higging A.L., Wohlford R.E.: Keyword recognition using template concatenation. Proc. ICASSP 85, 1233–1236 (1985)
Huang X.D.: Phoneme classification using semi-continuous hidden Markov models. IEEE Trans. 40(5), 1062–1067 (1992). doi:10.1109/78.134469
Huang X.D., Ariki Y., Jack M.A.: Hidden Markov models for speech recognition. Edinburgh University Press, (1990)
Millen, J.K.J.: Survivability measure. http://www.csl.sri.com/users/millen/papers/measure.ps
Wang, H.Q., Liu, D.X.: A holistic approach to survivable distributed information system for critical applications. In: Proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications, pp. 713–724 (2005)
Xu J.P., Wu W.: Theory and methods of multi-attribute decision making. Tsinghua university press, Beijing (2006)
Cooper W.W., Seiford L.M., Thanassoulis E. et al.: Dea and its uses in different countries. Eur. J. Oper. Res. 154(2), 337–344 (2004). doi:10.1016/S0377-2217(03)00173-5
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zheng, R., Zhang, M., Wu, Q. et al. Analysis and application of Bio-Inspired Multi-Net Security Model. Int. J. Inf. Secur. 9, 1–17 (2010). https://doi.org/10.1007/s10207-009-0091-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-009-0091-4