An Immunology-Inspired Network Security Architecture
نویسندگان
چکیده
منابع مشابه
A Distributed Surveillance Model for Network Security Inspired by Immunology
In the interest of surveying global attacks distributing in the networks, a distributed surveillance model for network security inspired by human immunity is proposed. The proposed model consists of attack detection agent, forensics sub-model, alarm sub-model and risk assessment sub-model. Through simulating immune mechanisms, a detection agent performs selfadaptation and self-learning to gener...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملUnified Security Architecture for enterprise network security
to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...
متن کاملAn Architecture for Network Security Using Feedback Control
In the past active worms have taken hours if not days to spread effectively. This gives sufficient time for humans to recognize the threat and limit the potential damage. This is not the case anymore. Modern viruses spread very quickly. Damage caused by modern computer viruses (example Code red, sapphire and Nimda) is greatly enhanced by the rate at which they spread. Most of these viruses have...
متن کاملAn Adaptive Nature-inspired Fog Architecture
During the last decade, Cloud computing has efficiently exploited the economy of scale by providing low cost computational and storage resources over the Internet, eventually leading to consolidation of computing resources into large data centers. However, the nascent of the highly decentralized Internet of Things (IoT) technologies that cannot effectively utilize the centralized Cloud infrastr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Wireless Communications
سال: 2020
ISSN: 1536-1284,1558-0687
DOI: 10.1109/mwc.001.2000046