The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-Peer (P2P) networking is beneficial when removing a centralized server. On the other hand, new mechanisms are required to compensate for the central authority, especially for network security and dependability. In this paper, we propose a new fuzzy reputation (Fuzzy-Rep) model to improve security and dependability of P2P e-commerce. The model employs fuzzy logic inference rules to assess transactions...
This paper describes a new approach for network security based on the combination of biological intrusion prevention and self-healing concepts. The presented system integrates an artificial immune intrusion prevention system for network security inspired by immunological theory known as danger theory. The approach is based upon data inspired by the human immune system (HIS). The IPS analyzes the malicious...
Intention recognition is the ability to predict an opposing forcepsilas high level goals. Knowing an attackerpsilas intention can support the decision-making of the network security administrators. Furthermore intent analysis plays an import role in the calculation of the inherent threat value. So how to recognize attack intention has become a research hot in network security domain recently.In this...
As traditional network security cannot meet the security requirements, the international research shows that network security is on the way to Trustworthy Internet and that the trustworthy issue becomes a hot topic in the future Internet. Trust evaluation of userspsila behavior is an important part of Trustworthy Internet and a rational trust model plays a key role in the evaluation. This paper concludes...
Intrusion tolerance is the rising third generation technology of network security. The self-cleansing intrusion tolerant system (SCITS) is a typical application of this technology. Through quantifying the redundancy of SCITS, a conclusion that a specific SCITS has an optimal redundancy which can maximize its intrusion tolerant performance is obtained in this paper. The method of computing the optimal...
Based on artificial immune theory, a new model of active defense for analyzing the network intrusion is presented. Dynamically evaluative equations for self, antigen, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. The concepts and formal definitions of immune cells are given, the hierarchical and distributed management framework of the proposed model are built. Furthermore,...
Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective strategy is an important problem. In this paper, by analyzing the fuzzy matrix game (FMG) theory and network survivability mechanism, a novel strategy selection model for network survivability based on FMG theory and its dynamic analysis method are...
In this paper, a method combining Bayesian statistical model with function of time slicing is presented, which is used for network anomaly detection. By using Bayesian statistical model with time function, the method is intended to find and determine anomaly in the computer network. Combining the advantages of Bayesian theorem when solving uncertain problems with the function whose network traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.