An Immunology-Inspired Network Security Architecture

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Surveillance Model for Network Security Inspired by Immunology

In the interest of surveying global attacks distributing in the networks, a distributed surveillance model for network security inspired by human immunity is proposed. The proposed model consists of attack detection agent, forensics sub-model, alarm sub-model and risk assessment sub-model. Through simulating immune mechanisms, a detection agent performs selfadaptation and self-learning to gener...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Unified Security Architecture for enterprise network security

to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...

متن کامل

An Architecture for Network Security Using Feedback Control

In the past active worms have taken hours if not days to spread effectively. This gives sufficient time for humans to recognize the threat and limit the potential damage. This is not the case anymore. Modern viruses spread very quickly. Damage caused by modern computer viruses (example Code red, sapphire and Nimda) is greatly enhanced by the rate at which they spread. Most of these viruses have...

متن کامل

An Adaptive Nature-inspired Fog Architecture

During the last decade, Cloud computing has efficiently exploited the economy of scale by providing low cost computational and storage resources over the Internet, eventually leading to consolidation of computing resources into large data centers. However, the nascent of the highly decentralized Internet of Things (IoT) technologies that cannot effectively utilize the centralized Cloud infrastr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Wireless Communications

سال: 2020

ISSN: 1536-1284,1558-0687

DOI: 10.1109/mwc.001.2000046