Computer network security risk evaluation

被引:0
|
作者
Li, T. [1 ]
机构
[1] Sichuan Univ, Coll Comp, Chengdu 610065, Peoples R China
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Inspired by the relationship between antibody concentration and intrusion intensity of pathogens in the human immune system, here we demonstrate that the way, which a doctor diagnoses a patient by checking the patient's temperature, can be exploited to evaluate the security risk faced by a computer network. In this model, which we call network temperature evaluation, the system itself learns what attacks it suffers, where the intrusions occur, whether the intrusions are serious or not. In addition, the system learns what the current popular attacks are, and where the most serious disastrous area is. With the proposed techniques, all the above information can be calculated quantitatively and in real-time.
引用
收藏
页码:2361 / 2365
页数:5
相关论文
共 50 条
  • [21] Study on the computer network security evaluation based on GABP algorithm
    Qiao, Xiaolin
    Boletin Tecnico/Technical Bulletin, 2017, 55 (18): : 497 - 504
  • [22] Comprehensive evaluation model for computer network security with linguistic information
    Li Y.
    Shan X.
    Wu G.
    Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 126 - 131
  • [23] A Danger Theory Inspired Security Evaluation Paradigm for Computer Network
    Sun, Feixian
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1333 - 1337
  • [24] Application of the Projection Pursuit Technique in the Evaluation of Computer Network Security
    Zhang, Yunlong
    Hua, Yong
    Zhang, Huimin
    Jing, Rongzhi
    ELECTRONIC INFORMATION AND ELECTRICAL ENGINEERING, 2012, 19 : 385 - 387
  • [25] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [26] Computer Network Security Evaluation Based on LM-BP Neural Network
    Huo, Zhenquan
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [27] Application of Fuzzy Logic in the Network Security Risk Evaluation
    Meng, Shang
    Wang, Peifeng
    Wang, JIchao
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 359 - 362
  • [28] A risk assessment standard and application method of computer network information security
    Sun, T.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 91 - 91
  • [29] Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
    Lv, Haitao
    Hu, Ruimin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 146 - 149
  • [30] Risk analysis of computer network service security management in commercial banks
    Lao, Guoling
    Wang, Liping
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON RISK ANALYSIS AND CRISIS RESPONSE, 2007, 2 : 417 - 422