浏览全部资源
扫码关注微信
1. 上海大学,上海 200444
2. 网络通信与安全紫金山实验室,江苏 南京 211100
3. 中原工学院,河南 郑州 451191
[ "李玉峰(1975- ),男,上海大学教授、博士生导师,主要研究方向为网络信息安全管控、智能系统网络安全、宽带网络等。" ]
[ "曹晨红(1991- ),女,博士,上海大学计算机学院讲师,主要研究方向为网络测量与安全、物联网系统与网络、智能感知技术。" ]
[ "李江涛(1990- ),男,博士,上海大学计算机学院讲师,主要研究方向为公钥密码学、车载网安全与隐私保护。" ]
[ "王鹏(1985- ),男,博士,中原工学院前沿信息技术研究院讲师,主要研究方向为智能系统安全、新型网络与通信安全。" ]
网络出版日期:2021-03,
纸质出版日期:2021-03-20
移动端阅览
李玉峰, 曹晨红, 李江涛, 等. 生物免疫启发下的一种内生安全技术框架[J]. 电信科学, 2021,37(3):49-56.
Yufeng LI, Chenhong CAO, Jiangtao LI, et al. An endogenous safety and security technical framework inspired by biological immune system[J]. Telecommunications science, 2021, 37(3): 49-56.
李玉峰, 曹晨红, 李江涛, 等. 生物免疫启发下的一种内生安全技术框架[J]. 电信科学, 2021,37(3):49-56. DOI: 10.11959/j.issn.1000-0801.2021051.
Yufeng LI, Chenhong CAO, Jiangtao LI, et al. An endogenous safety and security technical framework inspired by biological immune system[J]. Telecommunications science, 2021, 37(3): 49-56. DOI: 10.11959/j.issn.1000-0801.2021051.
内生安全是网络安全领域的新兴概念与技术方向。受生物免疫机制体现出的内生性安全效应启发,提出了一种内生安全技术框架,剖析了该框架的主要技术挑战,给出了对应的解决方案,分析了该框架的应用场景。分析发现,该框架具有较高的鲁棒性、自主性和自适应性,且具有很强的实用性。
Inspired by the endogenous safety and security effect of biological immune mechanism
an endogenous safety and security technology framework was proposed
the main technical challenges of the framework were analyzed
the corresponding solutions were given
and the application scenarios of the framework were analyzed.Comprehensive analysis shows that the framework presents high robustness
autonomy and adaptability
and has strong practicability.
邬江兴 . 鲁棒控制与内生安全 [J ] . 网信军民融合 , 2018 ( 3 ): 23 - 27 .
WU J X . Robust control and endogenous safety [J ] . Civil-Military Integration on Cyberspace , 2018 ( 3 ): 23 - 27 .
科学网 . 拟态防御或助网络安全实现再平衡 [EB ] . 2016 .
ScienceNet . Mimic defense may help rebalance network security [EB ] . 2016 .
网络空间拟态防御原理——广义鲁棒控制与内生安全(第二版)上册 [J ] . 北京 : 科学出版社 , 2018 .
Principles of mimic defense in cyberspace——generalized robust control and endogenous security (second edition) volume One [J ] . Beijing : Science Press , 2018 .
WU J X . Cyberspace mimic defense - generalized robust control and endogenous security [M ] . Switzerland : Springer International Publishing , 2020 .
齐向东 . 网络安全已进化到“内生安全”时代 [EB ] . 2019 .
QI X D . Network security has evolved into the era of “endogenous security” [EB ] . 2019 .
齐向东 . 网络安全形势有三大转变 [EB ] . 2019 .
QI X D . There are three major changes in the cyber security situation [EB ] . 2019 .
FORREST S , PERELSON A S , ALLEN L , et al . Self-nonself discrimination in a computer [C ] // Proceedings of 1994 IEEE computer society symposium on research in security and privacy . Piscataway:IEEE Press , 1994 : 202 - 212 .
KEPHART J O , . A biologically inspired immune system for computers [C ] // Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems,Artificial Life IV:Citeseer .[S.l.:s.n. ] , 1994 .
DASGUPTA D . Artificial immune systems and their applications [M ] . Heidelberg Springer Science & Business Media , 2012 .
LAMONT G B , MARMELSTEIN R E , VAN VELDHUIZEN D A . A distributedarchitecture for a self-adaptive computer virus immune system [M ] . New ideas in optimization .[S.l.:s.n. ] , 1999 : 167 - 184 .
KEPHART J , SORKIN G , SWIMMER M , et al . Blueprint for a computer immune system [C ] // Artificial immune systems and their applications . 1999 : 242 - 261 .
FORREST S , HOFMEYR S A , SOMAYAJI A . Computer immunology [J ] . Communications of the ACM , 1997 , 40 ( 10 ): 88 - 96 .
DASGUPTA D , . Immunity-based intrusion detection systems:A general frame- work [C ] // Proceedings of the 22nd National Information Systems Security Conference .[S.l.:s.n. ] , 1999 : 18 - 21 .
HARMER P K , WILLIAMS P D , GUNSCH G H , et al . An artificial immune system architecture for computer security applications [J ] . IEEE transactions on evolutionary computation , 2002 , 6 ( 3 ): 252 - 280 .
MTHUNZI S N , BENKHELIFA E , BOSAKOWSKI T , et al . A bio-inspired approach to cyber security [C ] // Proceedings of Machine Learning for Computer and Cyber Security:Principle,Algorithms,and Practices . Boca Raton:CRC Press , 2019 :75.
WLODARCZAK P , . Cyber immunity [C ] // International Conference on Bioinformatics and Biomedical Engineering . Heidelberg:Springer , 2017 : 199 - 208 .
RAUF U . A taxonomy of bio-inspired cyber security approaches:existing techniques and future directions [J ] . Arabian Journal for Science and Engineering , 2018 , 43 ( 12 ): 6693 - 6708 .
FERNANDES D A , FREIRE M M , FAZENDEIRO P A , et al . Applications of artificial immune systems to computer security:A survey [J ] . Journal of Information Security and Applications , 2017 , 35 : 138 - 159 .
BECK G , HABICHT G S . Immunity and the invertebrates [J ] . Scientific American , 1996 , 275 ( 5 ): 60 - 66 .
GENE M . Innate or non-specific immunity [EB ] . 2006 .
PANCER Z , COOPER M D . The evolution of adaptive immunity [J ] . ANNU REV IMMUNOL , 2006 ( 24 ): 497 - 518 .
MEIRA J , ANDRADE R,PRAÇA I , et al . Performance evaluation of unsupervised techniques in cyber-attack anomaly detection [J ] . Journal of Ambient Intelligence and Humanized Computing , 2020 , 11 ( 11 ): 4477 - 4489 .
DUESSEL P , GEHL C , FLEGEL U , et al . Detecting zero-day attacks using context-aware anomaly detection at the application-layer [J ] . International Journal of Information Security , 2017 , 16 ( 5 ): 475 - 490 .
SABEEL U , HEYDARI S S , MOHANKA H , et al . Evaluation of deep learning in detecting unknown network attacks [C ] // Proceedings of 2019 International Conference on Smart Applications,Communications and Networking (SmartNets) . Piscataway:IEEE Press , 2019 : 1 - 6 .
MAHAJAN V , PEDDOJU S K . Integration of network intrusion detection systems and honeypot networks for cloud security [C ] // Proceedings of 2017 International Conference onComputing,Communication and Automation (ICCCA) . Piscataway:IEEE Press , 2017 : 829 - 834 .
YU Y H , YU F , WU X P . Unknown attack detection model based on network behavior analysis [J ] . Chinese Journal of Network and Information Security , 2016 , 2 ( 6 ): 54 .
MAUGHAN D , NEWHOUSE W D , VAGOUN T . Introducing the federal cyber- security r&d strategic plan [J ] . 2012 .
卿昱 . 动态目标防御—为应对赛博威胁构建非对称的不确定性 [M ] . 北京 : 国防工业出版社 , 2014 .
QING Y . Dynamic target defense—constructing asymmetric uncertainty in response to cyber threats [M ] . Beijing : National Defense Industry Press , 2014 .
扈红超 , 陈福才 , 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 40 - 51 .
HU H C , CHEN F C , WANG Z P . Discussion on several issues and performance evaluation of mimic defense DHR model [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 40 - 51 .
刘建侯 . 功能安全技术基础 [M ] . 北京 : 机械工业出版社 , 2008 .
LIU J H . Fundamentals of functional safety technology [M ] . Beijing : Machinery Industry Press , 2008 .
0
浏览量
578
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构