Research on Situation Evaluation Based on Artificial Immune for Network Security

2011 ◽  
Vol 121-126 ◽  
pp. 4926-4930
Author(s):  
Rui Rui Zhang ◽  
Xin Xiao

As a new research area of network security, network security situation evaluation is significant for achieving large-scale network security monitoring. In this paper, the artificial immune technology is applied to the study of situation evaluation for network security. Mathematical expressions of immune elements such as antibodies, antigens are established, and basic immune mechanism such as self-tolerance, clone selection, immune memory are achieved. According to the relationships between concentration changes of antibodies and attack intensity of pathogens in biological immune system, a situation evaluation model for network security is proposed. In addition, this paper adopts the uncertainty reasoning method in the cloud theory to make multi-granularity analysis for network security situation. By modeling the security situation indicator, and using cloud rules generator and reverse cloud generator, we can get qualitative results of hosts and network's security situation. Theoretical analysis and experimental results show that the model is effective to evaluate situation for network security with advantages of real-time, adaptability and high accuracy.

Author(s):  
Bin Guo ◽  
Yunji Liang ◽  
Zhu Wang ◽  
Zhiwen Yu ◽  
Daqing Zhang ◽  
...  

In the past decades, numerous research efforts have been made to model and extract the contexts of users in pervasive computing environments. The recent explosion of sensor-equipped mobile phone market and the phenomenal growth of geo-tagged data (Twitter messages, Foursquare check-ins, etc.) have enabled the analysis of new dimensions of contexts that involve the social and urban context. The technology trend towards pervasive sensing and large-scale social and community computing is making “Social and Community Intelligence (SCI)” a new research area that aims at investigating individual/group behavior patterns, community and urban dynamics based on the “digital footprints.” It is believed that the SCI technology has the potential to revolutionize the field of context-aware computing. The aim of this chapter is to identify this emerging research area, present the research background, define the general system framework, characterize its unique properties, discuss the open research challenges, and present this emerging research field.


2010 ◽  
Vol 20-23 ◽  
pp. 849-855 ◽  
Author(s):  
Yuan Quan Shi ◽  
Tao Li ◽  
Wen Chen ◽  
Rui Rui Zhang

To effectively prevent large-scale network security attacks, a novel Predication Approach for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication approach, the concepts and formal definitions of antigen and antibody in the network security situation predication domain are given; meanwhile, the mathematical models of some antibody evolution operators being related to PANSSI are exhibited. By analyzing time series and computing the affinity between antigen and antibody in artificial immune system, network security situation predication model is established, and then the future situation of network security attacks is predicted by it. Experimental results prove that PANSSI can forecast the future network security situation real-timely and correctly, and provides a novel approach for network security situation predication.


2013 ◽  
Vol 2013 ◽  
pp. 1-7
Author(s):  
Hui He ◽  
Guotao Fan ◽  
Jianwei Ye ◽  
Weizhe Zhang

It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system’s plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks’ topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology.


2018 ◽  
pp. 172-182 ◽  
Author(s):  
Shengmin CAO

This paper mainly studies the application of intelligent lighting control system in different sports events in large sports competition venues. We take the Xiantao Stadium, a large­scale sports competition venue in Zaozhuang City, Shandong Province as an example, to study its intelligent lighting control system. In this paper, the PID (proportion – integral – derivative) incremental control model and the Karatsuba multiplication model are used, and the intelligent lighting control system is designed and implemented by multi­level fuzzy comprehensive evaluation model. Finally, the paper evaluates the actual effect of the intelligent lighting control system. The research shows that the intelligent lighting control system designed in this paper can accurately control the lighting of different sports in large stadiums. The research in this paper has important practical significance for the planning and design of large­scale sports competition venues.


MIS Quarterly ◽  
2016 ◽  
Vol 40 (4) ◽  
pp. 849-868 ◽  
Author(s):  
Kunpeng Zhang ◽  
◽  
Siddhartha Bhattacharyya ◽  
Sudha Ram ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document