Towards an integrated defense system for cyber security situation awareness experiment

Author(s):  
Hanlin Zhang ◽  
Sixiao Wei ◽  
Linqiang Ge ◽  
Dan Shen ◽  
Wei Yu ◽  
...  
2011 ◽  
Vol 10 ◽  
pp. 1029-1034 ◽  
Author(s):  
Yan Zhang ◽  
Shuguang Huang ◽  
Shize Guo ◽  
Junmao Zhu

This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.


2014 ◽  
Vol 543-547 ◽  
pp. 3023-3028
Author(s):  
Shao Jing Zhou

Active defense technology may predict future attack situation and detect unknown attacks, but it has many questions to will be researched: vulnerability, lower mal-ware detection rate, security situation awareness technology has faced problem of inter-organization cooperation, real-time response, correlation analysis, high-load low fault tolerance. Artificial immune technology combines with active defense technology to solve integrated artificial immune security situation awareness system with artificial immune technology and active defense technology by Black Hole theory and for diversification ad development characteristics of the artificial immune and active defense, gives a method about simulating Black Hole accretion theory to achieve absorption and utilization a variety of security and virus technology; a no escaped mechanism simulate the Black Hole; a method about access control method based on Hawking radiation theory. Based on the above work, applies virtual and sandbox technology to achieve network system itself virus immunity, and then that we implement re-engineering and reverse engineering for virus technology in order to study virus and dig more holes, create unified integrated defense tactics, so this defense system will improve ability of situation comprehension, situation prediction and intelligence decision.


Sign in / Sign up

Export Citation Format

Share Document