Skip to main content

An Immune-Based Model for Service Survivability

  • Conference paper
Cryptology and Network Security (CANS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4301))

Included in the following conference series:

  • 823 Accesses

Abstract

In order to enhance service survivability, an immune-based model for service survivability, referred to as ISSM, is presented. In the model, the concepts and formal definitions of self, nonself, immunocyte, diversity system, and etc., are given; the antibody concentration and the dynamic change process of host status are described. Building on the relationship between the antibody concentration and the state of an illness in the human immune system, the systemic service capability and the service risk are calculated quantitatively. Based on the differences of the immune system among individuals, a service survivability algorithm, dynamic service migration algorithm, is put forth. Simulation results show that the model is real-time and adaptive, thus providing an effective solution for service survivability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  2. Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a Rigorous Definition of Information System Survivability. In: Proc. of DISCEX, pp. 78–89 (2003)

    Google Scholar 

  3. Linger, E.C., Lipson, H.F.: Requirements Definition for Survivable Network Systems. In: Proc. of ICRE (1998)

    Google Scholar 

  4. Richard, C.L., Howard, F.L., et al.: Life-Cycle Models for Survivable Systems. Technical Report CMU/SEI-2002-TR-026 (2002)

    Google Scholar 

  5. Westmark, V.R.: A Definition for Information System Survivability. In: Proc. of HICSS, pp. 303–312 (2004)

    Google Scholar 

  6. Zhang, Y.Q., Zhang, H.Z.: Analysis on characters of survivability and emergent algorithms. Journal on Communications 26(1), 124–128 (2005)

    Google Scholar 

  7. Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences 48(5), 798–816 (2005)

    Google Scholar 

  8. Tedesco, G., Aickelin, U.: Data Reduction in Intrusion Alert Correlation. WSEAS Transactions on Computers 1(5), 186–193 (2006)

    Google Scholar 

  9. Madan, B.B., Goševa-Popstojanova, K., Vaidyanathan, K., et al.: Modeling and quantification of security attributes of software systems. In: Proc. of the International Conference on Dependable Systems and Networks, Washington, pp. 505–514 (2002)

    Google Scholar 

  10. Li, H., Cai, Z.M., Han, C.Z., Guan, X.H.: An Intrusion Detection Framework Based on Information Fusion. Mini-Micro Systems 24(9), 1602–1606 (2003)

    Google Scholar 

  11. Wang, Y.F., Li, T., et al.: A Real Time Method of Risk Evaluation Based on Artificial Immune System for Network Security. Acta Electronica Sinica 33(5), 945–949 (2005)

    Google Scholar 

  12. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proc. of the Congress on Evolutionary Computation, pp. 1015–1020 (2002)

    Google Scholar 

  13. Twycross, J., Aickelin, U.: Experimenting with innate immunity. In: Proc. of the Workshop on Artificial Immune Systems and Immune System Modelling, Bristol, pp. 18–19 (2006)

    Google Scholar 

  14. Harmer, P.K., Williams, P.D., Gunsch, G.H., et al.: An artificial immune system architecture for computer security applications. IEEE Transaction on Evolutionary Computation 6, 252–280 (2002)

    Article  Google Scholar 

  15. Chen, X.Q., Zhang, J.H., Fu, L., et al.: Model for the Deliver of Essential Services in the Survivability Network System Based on Mobile Agent. Journal of Chongqing University 27(10), 37–39 (2004)

    Google Scholar 

  16. Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50(17), 1912–1919 (2005)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zeng, J., Liu, X., Li, T., Sun, F., Peng, L., Liu, C. (2006). An Immune-Based Model for Service Survivability. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_25

Download citation

  • DOI: https://doi.org/10.1007/11935070_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49462-1

  • Online ISBN: 978-3-540-49463-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics