期刊文献+

一种信息系统免疫安全防护架构

An Information System Immune Security Protection Architecture
下载PDF
导出
摘要 随着网络的快速发展,各类社会活动的信息化日益普及,但是网络安全威胁也更加复杂多变,使得信息系统处于安全威胁风险极高的环境中,严重威胁信息的共享和获取。针对核心信息系统的安全防护,提出了一种信息系统免疫安全防护架构。针对信息系统高可用和高可靠性需求,结合生物免疫原理,围绕信息系统的系统、网络、终端建立协同联动的安全防护体系,并综合应用各类安全数据进行安全威胁的深度挖掘和响应处置,有效保障信息系统持续可靠地运行。 With the rapid development of the Internet,the informatization of various social activities are becoming more and more popular.However,the complexity of cyber security threats makes the information system in a big security threat environment,which seriously threatens the information sharing and acquisition.An immune security protection architecture for information system is proposed for the security protection of core information systems.For the demand of high availability and high reliability requirements of information system,combined with the principle of bio-immunity,a collaborative and linked security protection system is established around the system,network and terminal of information system,and various kinds of security data are applied comprehensively for in-depth mining and response disposal of security threats,thus effectively guarantee the continuous and reliable operation of the information system.
作者 高岩 滕鹏国 戴朝霞 谭平嶂 GAO Yan;TENG Pengguo;DAI Zhaoxia;TAN Pingzhang(Unit 61001 of PLA,Beijing 100072,China;No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2022年第10期1323-1328,共6页 Communications Technology
关键词 信息系统 免疫 安全防护 安全威胁 information system immune security protection security threat
  • 相关文献

参考文献4

二级参考文献25

  • 1郭利军,刘晓腾.安全防护环境下舰船监控网络病毒检测系统[J].舰船科学技术,2019,41(20):148-150. 被引量:1
  • 2Symantec. 2014 Internet security threat report, 2014 [EB/OL]. http://www, symantec, com/security_response/publications/threatreport, jsp? om_ext_cid = biz_socmed_twitter_facebook_marketwire_linkedin_2013 Apr_worldwide_ISTR18.
  • 3Forrest S, Perelson A S, Allen L, et al. Self - Nonself discrimination in a computer [ C ]//The IEEE Symposium on Research in Security and Privacy. Oakland : IEEE, 1994 : 202 - 212.
  • 4Greensmith J, Aickelin U, Cayzer S. Introducing dendritic cells as a novel immune -inspired algorithm for anomaly detection [ C ]/! LNCS,ICARIS. Heidelberg: Springer, 2005, 3627 : 153 - 167.
  • 5LN De Castro, FJ Von Zuben. The clonal selection algorithm with engineering application [ C ]//Proceedings of GECCO Workshop on Artificial Immune Systems and Their Applications. Las Vegas: CiteSeer, 2000:36 -37.
  • 6Matzinger P. Tolerance, danger and the extended family [ J]. Annual Review of Immunology, 1994, 12:991 - 1045.
  • 7Aickelin U, Bentley P, Cayzer S, et al. Danger theory : the link between AIS and IDS? [ C ]//LNCS, ICARIS. Heidelberg: Springer, 2003, 2787 : 147 - 155.
  • 8Gu F, Greensmith J, Aickelin U. Further exploration of the dendritic cell algorithm: antigen multiplier and time windows [ C ]//LNCS, ICAR- IS. Heidelberg: Springer, 2008, 5132:142 - 153.
  • 9Greensmith J, Aickelin U. The deterministic dendritic cell algorithm [ C ]//LNCS, ICARIS. Heidelberg: Springer, 2008, 5132:291 -303.
  • 10FANG Xian -jin, WANG Li. Theoretical investigation on the dendritic cells algorithm [ J]. Journal of Beijing Institute of Technology. 2014, 23(3) : 401 -406.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部