Abstract
With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized defense and passive defense methods will cause problems such as low service efficiency and insufficient defense capabilities in future networks. This paper proposes an endogenous security protection mechanism based on neural control of the human body. The main purpose of this paper is to learn from neural control mechanism, and build an autonomous active defense mechanism, so that the security elements and functional elements of the system can be highly integrated. This paper firstly mapped the human nerve control to the information system through the study of the human nerve control system. Then the nervous system-like control architecture was constructed, and a task-oriented execution architecture was rebuilt. In proposed system, security elements and functional elements are highly integrated into one model. The verification based on the prototype system construction framework shows that this endogenous security model based on neural control can maintain the security of the information system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng, D.G., Qin, Y., Wang, D., Chu, X.B.: Research on trusted computing technology. J. Comput. Res. Dev. 48(8), 1332–1349 (2011). (in Chinese)
Yan, Z., Govindaraju, V., Zheng, Q., Wang, Y.: IEEE access special section editorial: trusted computing. IEEE Access. 8, 25722–25726 (2020). https://doi.org/10.1109/ACCESS.2020.2969768
Wu, Y., Yan, Z., Choo, K.R., Yang, L.T.: IEEE access special section editorial: Internet-of-Things big data trust management. IEEE Access. 7, 65223–65227 (2019). https://doi.org/10.1109/ACCESS.2019.2915489
Hu, J., Shen, C.X., Gong, B.: Trusted Computing 3.0 Engineering Fundamentals. Posts and Telecom Press, Beijing (2017). (in Chinese)
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016). https://doi.org/10.1109/COMST.2015.2494502
Zheng, H., Shi, D.: A multi-agent system for environmental monitoring using boolean networks and reinforcement learning. J. Cyber Secur. 2(2), 85–96 (2020). https://www.techscience.com/JCS/v2n2/39508
Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology. International Business Machines Corporation, New York (2001)
Kapoor, V.: Services and autonomic computing a practical approach for designing manageability. In: 2005 IEEE International Conference on Services Computing (SCC 2005), Orlando, FL, USA, vol. 1, pp. 41–48. IEEE (2005). https://doi.org/10.1109/SCC.2005.88
Coutinho, E.F., Gomes, D.G., de Souza, J.N.: An Autonomic Computing-based architecture for cloud computing elasticity. In: 2015 Latin American Network Operations and Management Symposium (LANOMS), Joao Pessoa, Brazil, pp. 111–112. IEEE (2015). https://doi.org/10.1109/LANOMS.2015.7332681
Tahir, M., Mamoon Ashraf, Q., Dabbagh, M.: Towards enabling autonomic computing in IoT ecosystem. In Proceedings of the 2019 IEEE International Conference on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, pp. 646–651. IEEE (2019). https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00122
Mohamed, Y.A., Abdullah, A.B.: Immune inspired framework for ad hoc network security. In: Proceedings of the 2009 IEEE International Conference on Control and Automation, Christchurch, New Zealand, pp. 297–302. IEEE (2009). https://doi.org/10.1109/ICCA.2009.5410147
Li, T.: Dynamic detection for computer virus based on immune system. Sci. China Ser. F: Inf. Sci. 51(10), 1475–1486 (2008)
Hou, C.Z., Zhang, Y.J.: Biologically inspired immunity based on multi-agent: a new idea of research on computer anti-virus measures. J. Beijing Inst. Technol. 22(3), 270–274 (2002). (in Chinese)
Li, T.: An immune based dynamic intrusion detection model. Sci. Bull. 50(17), 1912–1919 (2005). (in Chinese)
Song, J., Meng, Q., Luo, C., Naik, N., Xu, J.: An immunization scheme for ransomware. Comput. Mat. Continua 64(2), 1051–1061 (2020). https://www.techscience.com/cmc/v64n2/39345
Nicholls, J.G., Martin, A.R., Fuchs, P.A., Brown, D.A., Diamond, M.E., et al.: From neuron to brain. Sinauer Associates, Cary, NC, USA (2012)
Acknowledgments
This research was supported by Zhishan Youth Scholar Program Of SEU, Purple Mountain Laboratories for Network and Communication Security, National Science Foundation (No. 61601113).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, T., Hu, X., Hu, A. (2021). Neural Control Based Research of Endogenous Security Model. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)