Network intruding danger estimating method based on immunity

A network intrusion and risk technology, applied in the field of information security, can solve the problems of inability to identify new attacks and variants of existing attacks, too simple network security calculation, and lack of self-adaptation.

Inactive Publication Date: 2006-10-18
SICHUAN UNIV
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method identifies host vulnerabilities based on the OVAL vulnerability definition and discovers the security problems caused by the combination of vulnerabilities. Attack types, unable to identify new attacks and variants of existing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intruding danger estimating method based on immunity
  • Network intruding danger estimating method based on immunity
  • Network intruding danger estimating method based on immunity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The idea of ​​the present invention will be described in detail below in conjunction with the accompanying drawings.

[0032] figure 1 Is the working principle of the present invention.

[0033] figure 1 The basic principle of the invention is given. We simulate the human immune system, and first design a local danger sensor LCRS (such as figure 1(a), quite a local immune cycle). In LCRS, we use an artificial immune cell to detect attacks from the network: when an immune cell detects an attack, it will self-clone and produce a large number of similar cells to resist more violent network attacks, and at the same time increase the concentration of its own antibodies In order to increase its vigilance; when the network attack is eliminated, the concentration of the corresponding cell antibody will also decay to 0 synchronously, indicating that the alarm is lifted. In this way, by calculating the concentration of antibodies in the host, the type, quantity, intensity an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of estimating invasion danger of network based on immune includes using self-collection dynamic evolution, blast self-tolerance, immaturative immune cell formation invasion detection, etc to not only have ability to identify existed attack mode effectively but also to have ability to discover new network attack in network environment varied at real time, enabling to carry out automatic classification on network attack mode and to calculate out attack danger and integral comprehensive danger faced by current network or host in network in real time quantitatively.

Description

technical field [0001] The invention proposes an immune-based network intrusion risk assessment method, which belongs to the field of information security. Background technique [0002] Traditional network intrusion risk assessment methods are mainly based on static assessment, that is, to comprehensively evaluate the risk level of the network by statically evaluating the value of the target network, security vulnerabilities, and the frequency of security incidents. Assessing the state of the system, there is no real-time and quantitative description of the attack the system is suffering, so it is impossible to actively adjust its defense strategy in real time according to the current attack intensity and danger level of the network, and there are many problems in specific applications. Big limitations. [0003] The Chinese Patent Publication No. CN1694454 application is based on the open vulnerability assessment language OVAL, distributes and collects system configuration ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
Inventor 李涛
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products