Skip to main content

A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model

  • Conference paper
Computing and Intelligent Systems (ICCIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 234))

Included in the following conference series:

Abstract

The artificial immune theory and the cloud model theory are applied to the research on situation awareness of network security in this paper. A security situation awareness model is established from three levels, including situation perception, situation comprehension and situation projection. In the model, network attacks can be real-timely monitored by the intrusion detection technology based on the danger theory and the cloud model; network security situation can be evaluated by the calculation of antibody concentration changes which have relationship with the attack power, and can be predicted by a new mechanism of time-series prediction based on cloud models according to the historical and current situations. The theoretical analysis and experimental results show that the model is effective to network security situation awareness with advantages of real-time and high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004) (in Chinese)

    Google Scholar 

  2. Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to AIS. In: 1st International Conference on AIS, pp. 141–148 (2002)

    Google Scholar 

  3. Visintine, V.: An Introduction to Information Risk Assessment. SANS Institute (2003)

    Google Scholar 

  4. Shifflet, J.: A technique independent fusion model for network intrusion detection. In: Proc of the Misstates Conference on Undergraduate Research in Computer Science and Mathematics, pp. 13–19 (2005)

    Google Scholar 

  5. Li, T.: An Immune Based Model for Network Monitoring. Chinese Journal of Computers 29, 1515–1522 (2006) (in Chinese)

    Google Scholar 

  6. Li, D., Liu, C.: Study on the Universality of the Normal Cloud Model. Engineering Science 6, 28–34 (2004) (in Chinese)

    Google Scholar 

  7. Chu, C.K., Chu, M.: An integrated framework for the assessment of network operations, reliability, and security. Bell Labs Technical Journal 8, 133–152 (2004)

    Article  Google Scholar 

  8. Li, D., Liu, C., Du, Y., Han, X.: Artificial intelligence with uncertainty. Journal of Software 15, 1583–1594 (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruirui, Z., Tao, L., Xin, X., Yuanquan, S. (2011). A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model. In: Wu, Y. (eds) Computing and Intelligent Systems. ICCIC 2011. Communications in Computer and Information Science, vol 234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24091-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24091-1_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24090-4

  • Online ISBN: 978-3-642-24091-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics