Computer network security risk evaluation

被引:0
|
作者
Li, T. [1 ]
机构
[1] Sichuan Univ, Coll Comp, Chengdu 610065, Peoples R China
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Inspired by the relationship between antibody concentration and intrusion intensity of pathogens in the human immune system, here we demonstrate that the way, which a doctor diagnoses a patient by checking the patient's temperature, can be exploited to evaluate the security risk faced by a computer network. In this model, which we call network temperature evaluation, the system itself learns what attacks it suffers, where the intrusions occur, whether the intrusions are serious or not. In addition, the system learns what the current popular attacks are, and where the most serious disastrous area is. With the proposed techniques, all the above information can be calculated quantitatively and in real-time.
引用
收藏
页码:2361 / 2365
页数:5
相关论文
共 50 条
  • [31] Research of the Main Risk in Computer Network Security and Its Management Measures
    Yang, Qing
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1189 - 1191
  • [32] An approach to network security evaluation of computer network information system with triangular fuzzy information
    Guo, Jin-cheng
    Fan, Dan
    Che, Hao-yuan
    Duan, Yun-na
    Wang, Hong-Su
    Zhang, Da-Wei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2029 - 2035
  • [33] Evaluation of Internet of Things computer network security and remote control technology
    Lu, Haifeng
    Wu, Haiwei
    Jing, Ru
    OPEN COMPUTER SCIENCE, 2024, 14 (01):
  • [34] Research on neural networks in computer network security evaluation and prediction methods
    Wei, Hanyu
    Zhao, Xu
    Shi, Baolan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2024, 28 (03) : 497 - 516
  • [35] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [36] Security Evaluation Methods of Computer Networks Based on BP Neural Network
    Li, Liping
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1191 - 1196
  • [37] Neural networks applicated in computer network security evaluation and reliability analysis
    Zhao Jinping
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 105 - 108
  • [38] Computer Network Security: Then and Now
    Witzke, Edward L.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 233 - 239
  • [39] Research on Computer Network Security
    Yin, Qinghai
    3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, : 235 - 240
  • [40] Study and Application of Risk Evaluation on Network Security Based on AHP
    Yan, Chun
    Qiao, Bo
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 198 - 205