Danger Theory Based Risk Evaluation Model for Smurf Attacks

Article Preview

Abstract:

Smurf attack belongs to popular Denial-of-Service (DoS) attack, and they can cause devastating impact on computer systems. Inspired by the principles of immune danger theory, a novel risk evaluation model, referred to as DTRESA, for smurf attacks is proposed in this paper. Within the presented model, dangerous smurf attacks are compared to bacterium (or virus) of the immune danger theory, which induce danger signal by simulating cellular distress or cell unnatural death; through immune recognition of artificial lymphocytes, the attacks are detected, and the attack risk is evaluated by calculating the danger signal of host computers. Simulation results and theoretical analysis show that the proposed model is feasible. Thus, it provides a novel solution to DoS detection and computer network security risk assessment.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

515-521

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. Zhang and M. Parashar: Cluster Comput., Vol. 13 (2010), pp.67-86.

Google Scholar

[2] R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems , 2nd Edition, John Wiley & Sons, (2008).

Google Scholar

[3] Information on http: /en. wikipedia. org/wiki/Computer_network_operations.

Google Scholar

[4] Y. Yang, J. Jiao, H. Wang and C. Xai, in: Proc. of the Int. Conf. Info. Sci. Eng., (2009), pp.1617-1621.

Google Scholar

[5] S. Hariri, Q.U. Guangzhi, T. Dharmagadda, M. Ramkishore and C. Raghavendra: IEEE Secur. Privacy, Vol. 1 (2003), pp.256-261.

DOI: 10.1109/msecp.2003.1236235

Google Scholar

[6] X. T. Duan, C. F. Liu and C. B. Liu: Journal on Communications, Vol. 31 (2010), pp.109-114.

Google Scholar

[7] M. Shehab, N. Mansour and A. Faour, in: Proc. of the Int. Symp. Parall. Archit. Algorithms Networks, (2008), pp.167-172.

Google Scholar

[8] S. Teng, H. Du, N. Wu, W. Zhang and J. Su: Journal of Networks, Vol. 5 (2010), pp.475-483.

Google Scholar

[9] F. D. Rango and A. Marano, in Proc. of the ACM Int. Wirel. Commun. Mob. Comput. Conf., (2009), pp.1443-1448.

Google Scholar

[10] F. Sun, Q. Zheng and T. Li, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2008), pp.644-647.

Google Scholar

[11] T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.

Google Scholar

[12] R. L. Fanelli: Lecture Notes in Computer Science, Vol. 6209 (2010), pp.264-275.

Google Scholar

[13] F. Sun and L. Gao, in Proc. of the ETP/IITA Conf. Sys. Sci. Simu. Eng., (2010), pp.62-65.

Google Scholar

[14] G. R. Zargar and P. Kabiri, in: Proc. of the IEEE Stud. Conf. Res. Dev., (2009), pp.49-52.

Google Scholar

[15] S. Kumar, M. Azad, O. Gomez and R. Valdez, in: Proc. Adv. Int. Conf. Telecom. Int. Conf. Internet Web Applic. Serv., (2006), p.89.

Google Scholar

[16] F. Sun, M. Kong and S. Deng, in: Proc. of the Int. Conf. Networks Secur., Wirel. Commun. Trusted Comput., Vol. 1 (2010), pp.74-76.

Google Scholar

[17] L. N. Castro and J. I. Timmis: Soft Computing, Vol. 7 (2003), pp.526-544.

Google Scholar

[18] N. Nanas and A. De Roeck: Lecture Notes in Computer Science, Vol. 4628 (2007), pp.13-24.

Google Scholar

[19] F. Sun and Z. Wu, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., (2009), pp.119-121.

Google Scholar

[20] F. Sun and F. Xu, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2009), pp.1-4.

Google Scholar

[21] F. Sun and S. Zhang, in: Proc. of the Int. Conf. Web Inf. Syst. Min., (2009), pp.515-518.

Google Scholar

[22] F. Sun, X. Han and J. Wang, in: Proc. of the Int. Conf. Chall. Environ. Sci. Comput. Eng., Vol. 2 (2010), pp.33-35.

Google Scholar

[23] P. Matzinger: Science, Vol. 12 (2002), pp.301-305.

Google Scholar

[24] F. Sun, M. Kong and J. Wang, in: Proc. of the Int. Conf. MultiMedia Info. Technol., Vol. 2 (2010), pp.93-95.

Google Scholar

[25] F. Sun, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., Vol. 2 (2010), pp.145-148.

Google Scholar

[26] F. Sun: submitted to Journal of Advanced Materials Research (2010).

Google Scholar