Skip to main content

Advertisement

Log in

Analysis and application of Bio-Inspired Multi-Net Security Model

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system cannot satisfy the security requirement. The excellent security performance of biological systems impels the bio-inspired network security theory to be a hot research area currently. Based on Bio-inspired Multidimensional Network Security Model we have put forward, we have advanced Bio-inspired Multi-Net Security system by implementing the functional distribution of different subnets of different transient states in Multi-Net Paralleling structure. Firstly, parameter estimation and modified algorithms of Hidden Markov Model are introduced to construct the mathematical mode of B-MNS; secondly, the integrated performance of our modified B-MNS has been tested and its simulation has been carried out. So the feasibility, validity and high efficiency of our model have been demonstrated theoretically, and practically.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Forrest S., Hofmeyr S.A., Somayaji A.: Computer immunology. Commun. ACM 40(10), 88–96 (1997). doi:10.1145/262793.262811

    Article  Google Scholar 

  2. Kephart, J.O.: A biologically inspired immune system for computers. In: Proceedings of the Fourth International Workshop On the Synthesis and Simulation of Living Systems and Artificial Life, pp. 130–139 (1994)

  3. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., et al: A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120–128. IEEE Computer Society Press, (1996)

  4. Sima, Y.R., Liang, Y.W., et al.: The lymphocyte evolution approach of digital sequence antigen. Computer Engineering and Application, pp. 70–72 (2003)

  5. MAO X.Y., Liang Y.W.: Research on the model of immune firewall. Comput. Eng. 25(8), 1282–1285 (2004)

    Google Scholar 

  6. Bradley, D.W., Ortega-sanchez, C., Tyrrell, A.M., et al.: Embryonics + immunotronics: a bio-inspired approach to fault tolerance. In: Proceedings of the Second NASA/DoD Workshop on Evolvable Hardware (2000)

  7. Wang H.Q., Zheng R.J., Li X.Y., Liu D.X.: A bio-inspired multidimensional network Security model. Proc. IMSCCS (2), 3–7 (2006)

  8. Wu, H.Y., Qi, L.: Research on security protection architecture of campus network system. http://www.cic.tsinghua.edu.cn/download.jsp?attachSeq=435

  9. Zheng, R.J., Wang, H.Q.: Study on bio-inspired TNP implementation structure of BMNSM. The Sixth World Congress on Intelligent Control and Automation, DaLian, China IEEE: ThP2.255 (2006)

  10. Higging A.L., Wohlford R.E.: Keyword recognition using template concatenation. Proc. ICASSP 85, 1233–1236 (1985)

    Google Scholar 

  11. Huang X.D.: Phoneme classification using semi-continuous hidden Markov models. IEEE Trans. 40(5), 1062–1067 (1992). doi:10.1109/78.134469

    Article  Google Scholar 

  12. Huang X.D., Ariki Y., Jack M.A.: Hidden Markov models for speech recognition. Edinburgh University Press, (1990)

  13. Millen, J.K.J.: Survivability measure. http://www.csl.sri.com/users/millen/papers/measure.ps

  14. Wang, H.Q., Liu, D.X.: A holistic approach to survivable distributed information system for critical applications. In: Proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications, pp. 713–724 (2005)

  15. Xu J.P., Wu W.: Theory and methods of multi-attribute decision making. Tsinghua university press, Beijing (2006)

    Google Scholar 

  16. Cooper W.W., Seiford L.M., Thanassoulis E. et al.: Dea and its uses in different countries. Eur. J. Oper. Res. 154(2), 337–344 (2004). doi:10.1016/S0377-2217(03)00173-5

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruijuan Zheng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zheng, R., Zhang, M., Wu, Q. et al. Analysis and application of Bio-Inspired Multi-Net Security Model. Int. J. Inf. Secur. 9, 1–17 (2010). https://doi.org/10.1007/s10207-009-0091-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-009-0091-4

Keywords

Navigation