Research Framework and Anticipated Results of New Network Architecture and Key Technologies Supported by Endogenous Security

被引:0
|
作者
Li T. [1 ]
Lan X. [1 ]
Li B. [1 ]
Wang W. [2 ]
Li L. [3 ]
Wang L. [4 ]
机构
[1] School of Cyber Sci. and Eng., Sichuan Univ., Chengdu
[2] Inst. of Info. Eng., CAS, Beijing
[3] School of Cyberspace Security, Beijing Univ. of Posts and Telecommunications, Beijing
[4] School of Cyber Sci. and Eng., Wuhan Univ., Wuhan
关键词
artificial immune system; endogenous security; network intrusion detection; risk assessment; risk control;
D O I
10.15961/j.jsuese.202201149
中图分类号
学科分类号
摘要
At present, network threats have entered the era of unknown threats. However, traditional network security is based on “Maginot” static passive defense, which lacks autonomy and endogenous security ability of self evolution. The unknown threats can only be remedied after-wards by “patching”. Yet, this method is often accompanied by huge losses, and new ideas should be sought. The network security protection system has striking similarities with the human immune system. The immune system does not require prior knowledge of viruses, has strong learning and deduction ability, and is born with the ability to inactivate unknown viruses. Inspired by immune system, with “unknown threat” as the core and “artificial immunity” as the innovative means, this research focused on four key scientific issues, including the evolution mechanism of network security system, network adaptive trusted transmission conditions, the rapid discovery mechanism of unknown threat, and the rapid response strategy of unknown threat. Meanwhile, a basic theory, three key technologies, and a prototype system were studied in this paper. Through the research on new network architecture and basic theory based on immunity for endogenous security, the mRNA immune-based trusted network addressing and routing control technology, the large-scale dynamic trusted behavior analysis and unknown network threat discovery technology, and the immune-based network dynamic risk assessment and control technology, the traditional “patch” passive defense network security technology bottleneck will be broken, thereby laying the basic theory and method of the new network system supported by endogenous security. Finally, by constructing a new immune-based network prototype system for endogenous security, the research results were technically verified, and the proposed theories and methods can be further improved according to the verification results. Through the above research, the following five innovations have been achieved: 1) the cyberspace security immune architecture for endogenous security, 2) the mRNA immune-based trusted network addressing and routing control method, 3) the adaptive discovery method of unknown network threats based on gene evolution, 4) the real-time quantitative calculation method of network dynamic risk based on human body temperature warning mechanism, 5) the rapid dynamic feedback iterative network risk control method based on specific immunity. The research results have important theoretical significance and practical application value for scientific research, technology research, and industrial development of cyberspace security protection. © 2023 Editorial Department of Journal of Sichuan University. All rights reserved.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 40 条
  • [1] Kaspersky security bulletin 2021[EB/OL]
  • [2] Klarreich E., Inspired by immunity[J], Nature, 415, 6871, pp. 468-470, (2002)
  • [3] Balthrop J, Forrest S, Newman M E J, Et al., Technological networks and the spread of computer viruses[J], Science, 304, 5670, pp. 527-529, (2004)
  • [4] Dasgupta D, Yu S, Majumdar N S., MILA–multilevel immune learning algorithm and its application to anomaly detection[J], Soft Computing, 9, 3, pp. 172-184, (2005)
  • [5] Cohen I R., Real and artificial immune systems:Computing the state of the body[J], Nature Reviews Immunology, 7, 7, pp. 569-574, (2007)
  • [6] Timmis J., Artificial immune systems—Today and tomorrow[J], Natural Computing, 6, 1, pp. 1-18, (2007)
  • [7] Timmis J, Andrews P, Owens N, Et al., An interdisciplinary perspective on artificial immune systems[J], Evolutionary Intelligence, 1, 1, pp. 5-26, (2008)
  • [8] Okamoto T, Ishida Y., Towards an immunity-based system for detecting masqueraders[J], International Journal of Knowledge-Based and Intelligent Engineering Systems, 13, pp. 103-110, (2009)
  • [9] Twycross J, Aickelin U., Detecting anomalous process behaviour using second generation artificial immune systems[J], SSRN Electronic Journal, 6, pp. 301-327, (2010)
  • [10] Kephart J O., Learning from nature[J], Science, 331, 6018, pp. 682-683, (2011)