Artificial immunity-based model for information system security risk evaluation

An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in wh...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Caiming Liu, Minhua Guo, Lingxi Peng, Jing Guo, Shu Yang, Jinquan Zeng
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 42
container_issue
container_start_page 39
container_title
container_volume 1
creator Caiming Liu
Minhua Guo
Lingxi Peng
Jing Guo
Shu Yang
Jinquan Zeng
description An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.
doi_str_mv 10.1109/EDT.2010.5496552
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5496552</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5496552</ieee_id><sourcerecordid>5496552</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-39021cce9ccd88a9c42726941366fd067171bef4f746d286da03ee077fb3d9173</originalsourceid><addsrcrecordid>eNo1UEtrwzAY8xiFrV3ug138B9J9fsSOj6XrukGhl9yLY38Gb3mMOBnk3y9snQ4SQkIHEfLIYMsYmOfDS7XlsLhCGlUU_IasmeRSFgXTcEsyo8t_L2FF1hzAGFEKoe9IltIHLJAF5xzuyXk3jDFEF21DY9tOXRznvLYJPW17jw0N_UBjt3Brx9h3NM1pxJYmdNOwdOkQ0yfFb9tMv_kDWQXbJMyuuiHV66Hav-Wn8_F9vzvl0cCYCwOcOYfGOV-W1jjJNVdGMqFU8KA006zGIIOWyvNSeQsCEbQOtfCGabEhT3-zEREvX0Ns7TBfrn-IH2jJUjo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Artificial immunity-based model for information system security risk evaluation</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</creator><creatorcontrib>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</creatorcontrib><description>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</description><identifier>ISBN: 9781424455140</identifier><identifier>ISBN: 1424455146</identifier><identifier>EISBN: 1424455170</identifier><identifier>EISBN: 9781424455164</identifier><identifier>EISBN: 1424455162</identifier><identifier>EISBN: 9781424455171</identifier><identifier>DOI: 10.1109/EDT.2010.5496552</identifier><identifier>LCCN: 2009938337</identifier><language>eng</language><publisher>IEEE</publisher><subject>Artificial Immunity ; Computational modeling ; Computer science ; Computer security ; Detectors ; Immune system ; Information management ; Information security ; Information System ; Information systems ; Management information systems ; Real time systems ; Risk Evaluation ; Security Risk</subject><ispartof>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2010, Vol.1, p.39-42</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5496552$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5496552$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Caiming Liu</creatorcontrib><creatorcontrib>Minhua Guo</creatorcontrib><creatorcontrib>Lingxi Peng</creatorcontrib><creatorcontrib>Jing Guo</creatorcontrib><creatorcontrib>Shu Yang</creatorcontrib><creatorcontrib>Jinquan Zeng</creatorcontrib><title>Artificial immunity-based model for information system security risk evaluation</title><title>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)</title><addtitle>EDT</addtitle><description>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</description><subject>Artificial Immunity</subject><subject>Computational modeling</subject><subject>Computer science</subject><subject>Computer security</subject><subject>Detectors</subject><subject>Immune system</subject><subject>Information management</subject><subject>Information security</subject><subject>Information System</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Real time systems</subject><subject>Risk Evaluation</subject><subject>Security Risk</subject><isbn>9781424455140</isbn><isbn>1424455146</isbn><isbn>1424455170</isbn><isbn>9781424455164</isbn><isbn>1424455162</isbn><isbn>9781424455171</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1UEtrwzAY8xiFrV3ug138B9J9fsSOj6XrukGhl9yLY38Gb3mMOBnk3y9snQ4SQkIHEfLIYMsYmOfDS7XlsLhCGlUU_IasmeRSFgXTcEsyo8t_L2FF1hzAGFEKoe9IltIHLJAF5xzuyXk3jDFEF21DY9tOXRznvLYJPW17jw0N_UBjt3Brx9h3NM1pxJYmdNOwdOkQ0yfFb9tMv_kDWQXbJMyuuiHV66Hav-Wn8_F9vzvl0cCYCwOcOYfGOV-W1jjJNVdGMqFU8KA006zGIIOWyvNSeQsCEbQOtfCGabEhT3-zEREvX0Ns7TBfrn-IH2jJUjo</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Caiming Liu</creator><creator>Minhua Guo</creator><creator>Lingxi Peng</creator><creator>Jing Guo</creator><creator>Shu Yang</creator><creator>Jinquan Zeng</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>Artificial immunity-based model for information system security risk evaluation</title><author>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-39021cce9ccd88a9c42726941366fd067171bef4f746d286da03ee077fb3d9173</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Artificial Immunity</topic><topic>Computational modeling</topic><topic>Computer science</topic><topic>Computer security</topic><topic>Detectors</topic><topic>Immune system</topic><topic>Information management</topic><topic>Information security</topic><topic>Information System</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Real time systems</topic><topic>Risk Evaluation</topic><topic>Security Risk</topic><toplevel>online_resources</toplevel><creatorcontrib>Caiming Liu</creatorcontrib><creatorcontrib>Minhua Guo</creatorcontrib><creatorcontrib>Lingxi Peng</creatorcontrib><creatorcontrib>Jing Guo</creatorcontrib><creatorcontrib>Shu Yang</creatorcontrib><creatorcontrib>Jinquan Zeng</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Caiming Liu</au><au>Minhua Guo</au><au>Lingxi Peng</au><au>Jing Guo</au><au>Shu Yang</au><au>Jinquan Zeng</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Artificial immunity-based model for information system security risk evaluation</atitle><btitle>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)</btitle><stitle>EDT</stitle><date>2010-04</date><risdate>2010</risdate><volume>1</volume><spage>39</spage><epage>42</epage><pages>39-42</pages><isbn>9781424455140</isbn><isbn>1424455146</isbn><eisbn>1424455170</eisbn><eisbn>9781424455164</eisbn><eisbn>1424455162</eisbn><eisbn>9781424455171</eisbn><abstract>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</abstract><pub>IEEE</pub><doi>10.1109/EDT.2010.5496552</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424455140
ispartof 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2010, Vol.1, p.39-42
issn
language eng
recordid cdi_ieee_primary_5496552
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Artificial Immunity
Computational modeling
Computer science
Computer security
Detectors
Immune system
Information management
Information security
Information System
Information systems
Management information systems
Real time systems
Risk Evaluation
Security Risk
title Artificial immunity-based model for information system security risk evaluation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T23%3A44%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Artificial%20immunity-based%20model%20for%20information%20system%20security%20risk%20evaluation&rft.btitle=2010%20International%20Conference%20on%20E-Health%20Networking%20Digital%20Ecosystems%20and%20Technologies%20(EDT)&rft.au=Caiming%20Liu&rft.date=2010-04&rft.volume=1&rft.spage=39&rft.epage=42&rft.pages=39-42&rft.isbn=9781424455140&rft.isbn_list=1424455146&rft_id=info:doi/10.1109/EDT.2010.5496552&rft_dat=%3Cieee_6IE%3E5496552%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424455170&rft.eisbn_list=9781424455164&rft.eisbn_list=1424455162&rft.eisbn_list=9781424455171&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5496552&rfr_iscdi=true