Danger Theory Based Risk Evaluation Model for Smurf Attacks

  title={Danger Theory Based Risk Evaluation Model for Smurf Attacks},
  author={Feixian Sun},
  journal={Key Engineering Materials},
  pages={515 - 521}
  • Feixian Sun
  • Published 1 February 2011
  • Computer Science
  • Key Engineering Materials
Smurf attack belongs to popular Denial-of-Service (DoS) attack, and they can cause devastating impact on computer systems. Inspired by the principles of immune danger theory, a novel risk evaluation model, referred to as DTRESA, for smurf attacks is proposed in this paper. Within the presented model, dangerous smurf attacks are compared to bacterium (or virus) of the immune danger theory, which induce danger signal by simulating cellular distress or cell unnatural death; through immune… 



Cooperative detection and protection against network attacks using decentralized information sharing

This paper presents a conceptual model that defines the relationships between the level of knowledge in the distributed system and the accuracy of attack detection, and the design of a cooperative attack detection and defense framework and its use for detecting and defending against DDoS attacks and Internet worms is described.

Vulnerability Analysis of Faults/Attacks in Network Centric Systems

This analysis helps to determine the most critical components in the network, the failure of which might lead to a massive network outage or performance degradation and the vulnerability metrics that can be integrated with the control and management system to achieve proactive responses to faults/attacks and thus minimizes the impacts of these attacks and improve survivability of network infrastructure and services.

Further Experimentation with Hybrid Immune Inspired Network Intrusion Detection

This hybrid model combines established network monitoring methods with artificial immune system methods to achieve improved performance and presets experiments investigating the model’s performance in detecting novel threats and the performance contribution of the individual components are presented.

Security engineering - a guide to building dependable distributed systems (2. ed.)

In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.

Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson

The method involves the administration of an NADPH-oxidase inhibitor in an amount sufficient to treat the cell, tissue, organ or animal for reperfusion injury prophylactically or therapeutically.

Artificial immune systems as a novel soft computing paradigm

This paper proposes one such framework for AIS, discusses the suitability of AIS as a novel soft computing paradigm and reviews those works from the literature that integrate AIS with other approaches, focusing ANN, EA and FS.

Impact Analysis of Faults and Attacks in Large-Scale Networks

The agent-based architecture presented here continuously monitors network vulnerability metrics providing new ways to measure the impact of faults and attacks.

The Danger Model: A Renewed Sense of Self

A model of immunity based on the idea that the immune system is more concerned with entities that do damage than with those that are foreign is outlined.

Multimodal Dynamic Optimization: From Evolutionary Algorithms to Artificial Immune Systems

It is argued that while Evolutionary Al algorithms have inherent diversity problems that do not allow them to successfully deal with multimodal dynamic optimisation, the biological immune system involves natural processes for maintaining and boosting diversity and thus serves well as a metaphor for tackling this problem.

in: Proc

  • of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., Vol. 2
  • 2010