Artificial immunity-based model for information system security risk evaluation
An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in wh...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 42 |
---|---|
container_issue | |
container_start_page | 39 |
container_title | |
container_volume | 1 |
creator | Caiming Liu Minhua Guo Lingxi Peng Jing Guo Shu Yang Jinquan Zeng |
description | An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity. |
doi_str_mv | 10.1109/EDT.2010.5496552 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5496552</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5496552</ieee_id><sourcerecordid>5496552</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-39021cce9ccd88a9c42726941366fd067171bef4f746d286da03ee077fb3d9173</originalsourceid><addsrcrecordid>eNo1UEtrwzAY8xiFrV3ug138B9J9fsSOj6XrukGhl9yLY38Gb3mMOBnk3y9snQ4SQkIHEfLIYMsYmOfDS7XlsLhCGlUU_IasmeRSFgXTcEsyo8t_L2FF1hzAGFEKoe9IltIHLJAF5xzuyXk3jDFEF21DY9tOXRznvLYJPW17jw0N_UBjt3Brx9h3NM1pxJYmdNOwdOkQ0yfFb9tMv_kDWQXbJMyuuiHV66Hav-Wn8_F9vzvl0cCYCwOcOYfGOV-W1jjJNVdGMqFU8KA006zGIIOWyvNSeQsCEbQOtfCGabEhT3-zEREvX0Ns7TBfrn-IH2jJUjo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Artificial immunity-based model for information system security risk evaluation</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</creator><creatorcontrib>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</creatorcontrib><description>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</description><identifier>ISBN: 9781424455140</identifier><identifier>ISBN: 1424455146</identifier><identifier>EISBN: 1424455170</identifier><identifier>EISBN: 9781424455164</identifier><identifier>EISBN: 1424455162</identifier><identifier>EISBN: 9781424455171</identifier><identifier>DOI: 10.1109/EDT.2010.5496552</identifier><identifier>LCCN: 2009938337</identifier><language>eng</language><publisher>IEEE</publisher><subject>Artificial Immunity ; Computational modeling ; Computer science ; Computer security ; Detectors ; Immune system ; Information management ; Information security ; Information System ; Information systems ; Management information systems ; Real time systems ; Risk Evaluation ; Security Risk</subject><ispartof>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2010, Vol.1, p.39-42</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5496552$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5496552$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Caiming Liu</creatorcontrib><creatorcontrib>Minhua Guo</creatorcontrib><creatorcontrib>Lingxi Peng</creatorcontrib><creatorcontrib>Jing Guo</creatorcontrib><creatorcontrib>Shu Yang</creatorcontrib><creatorcontrib>Jinquan Zeng</creatorcontrib><title>Artificial immunity-based model for information system security risk evaluation</title><title>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)</title><addtitle>EDT</addtitle><description>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</description><subject>Artificial Immunity</subject><subject>Computational modeling</subject><subject>Computer science</subject><subject>Computer security</subject><subject>Detectors</subject><subject>Immune system</subject><subject>Information management</subject><subject>Information security</subject><subject>Information System</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Real time systems</subject><subject>Risk Evaluation</subject><subject>Security Risk</subject><isbn>9781424455140</isbn><isbn>1424455146</isbn><isbn>1424455170</isbn><isbn>9781424455164</isbn><isbn>1424455162</isbn><isbn>9781424455171</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1UEtrwzAY8xiFrV3ug138B9J9fsSOj6XrukGhl9yLY38Gb3mMOBnk3y9snQ4SQkIHEfLIYMsYmOfDS7XlsLhCGlUU_IasmeRSFgXTcEsyo8t_L2FF1hzAGFEKoe9IltIHLJAF5xzuyXk3jDFEF21DY9tOXRznvLYJPW17jw0N_UBjt3Brx9h3NM1pxJYmdNOwdOkQ0yfFb9tMv_kDWQXbJMyuuiHV66Hav-Wn8_F9vzvl0cCYCwOcOYfGOV-W1jjJNVdGMqFU8KA006zGIIOWyvNSeQsCEbQOtfCGabEhT3-zEREvX0Ns7TBfrn-IH2jJUjo</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Caiming Liu</creator><creator>Minhua Guo</creator><creator>Lingxi Peng</creator><creator>Jing Guo</creator><creator>Shu Yang</creator><creator>Jinquan Zeng</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>Artificial immunity-based model for information system security risk evaluation</title><author>Caiming Liu ; Minhua Guo ; Lingxi Peng ; Jing Guo ; Shu Yang ; Jinquan Zeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-39021cce9ccd88a9c42726941366fd067171bef4f746d286da03ee077fb3d9173</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Artificial Immunity</topic><topic>Computational modeling</topic><topic>Computer science</topic><topic>Computer security</topic><topic>Detectors</topic><topic>Immune system</topic><topic>Information management</topic><topic>Information security</topic><topic>Information System</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Real time systems</topic><topic>Risk Evaluation</topic><topic>Security Risk</topic><toplevel>online_resources</toplevel><creatorcontrib>Caiming Liu</creatorcontrib><creatorcontrib>Minhua Guo</creatorcontrib><creatorcontrib>Lingxi Peng</creatorcontrib><creatorcontrib>Jing Guo</creatorcontrib><creatorcontrib>Shu Yang</creatorcontrib><creatorcontrib>Jinquan Zeng</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Caiming Liu</au><au>Minhua Guo</au><au>Lingxi Peng</au><au>Jing Guo</au><au>Shu Yang</au><au>Jinquan Zeng</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Artificial immunity-based model for information system security risk evaluation</atitle><btitle>2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)</btitle><stitle>EDT</stitle><date>2010-04</date><risdate>2010</risdate><volume>1</volume><spage>39</spage><epage>42</epage><pages>39-42</pages><isbn>9781424455140</isbn><isbn>1424455146</isbn><eisbn>1424455170</eisbn><eisbn>9781424455164</eisbn><eisbn>1424455162</eisbn><eisbn>9781424455171</eisbn><abstract>An artificial immunity principle based model for information system security risk evaluation is proposed. Recognition of harmful antigen by immunocytes is simulated. Immature, mature and memory detectors are defined. Evolution process of the detector is derived with math method. The math model in which the detectors recognize threats is constructed. The intensity of a threat and the vulnerability in the information system are recognized. The quantitative computation equation of security risk is deduced through the threats and vulnerabilities. The theoretical analysis shows that the proposed model provides a new approach for the information system security risk evaluation in real-time and quantity.</abstract><pub>IEEE</pub><doi>10.1109/EDT.2010.5496552</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424455140 |
ispartof | 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), 2010, Vol.1, p.39-42 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5496552 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Artificial Immunity Computational modeling Computer science Computer security Detectors Immune system Information management Information security Information System Information systems Management information systems Real time systems Risk Evaluation Security Risk |
title | Artificial immunity-based model for information system security risk evaluation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T23%3A44%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Artificial%20immunity-based%20model%20for%20information%20system%20security%20risk%20evaluation&rft.btitle=2010%20International%20Conference%20on%20E-Health%20Networking%20Digital%20Ecosystems%20and%20Technologies%20(EDT)&rft.au=Caiming%20Liu&rft.date=2010-04&rft.volume=1&rft.spage=39&rft.epage=42&rft.pages=39-42&rft.isbn=9781424455140&rft.isbn_list=1424455146&rft_id=info:doi/10.1109/EDT.2010.5496552&rft_dat=%3Cieee_6IE%3E5496552%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424455170&rft.eisbn_list=9781424455164&rft.eisbn_list=1424455162&rft.eisbn_list=9781424455171&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5496552&rfr_iscdi=true |