Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 4517019, 10 pages
http://dx.doi.org/10.1155/2016/4517019
Research Article

A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature

School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, Henan 450002, China

Received 8 April 2016; Revised 29 June 2016; Accepted 20 July 2016

Academic Editor: Tzonelih Hwang

Copyright © 2016 Y. P. Jiang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Tim, “Intrusion detection systems and multi-sensor data fusion creating cyberspace situational awareness,” Proceedings of the ACM, vol. 43, no. 4, pp. 99–105, 2000. View at Google Scholar
  2. M. Li and M. Bardi, “A risk assessment method of cloud computing based on multi-level fuzzy comprehensive evaluation,” in Proceedings of the International Conference on Cyberspace Technology (CCT '14), pp. 1–4, Beijing, China, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Sotoodeh Gohar, M. Khanzadi, M. Parchami Jalal, and A. A. Shirzadi Javid, “Construction projects risk assessment based on fuzzy AHP,” in Proceedings of the IEEE Student Conference on Research and Development (SCOReD '09), pp. 570–573, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Alhomidi and M. Reed, “Risk assessment and analysis through population-based attack graph modelling,” in Proceedings of the World Congress on Internet Security (WorldCIS '13), pp. 19–24, IEEE, London, UK, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Keramati and A. Akbari, “An attack graph based metric for security evaluation of computer networks,” in Proceedings of the 6th International Symposium on Telecommunications (IST '12), pp. 1094–1098, IEEE, Tehran, Iran, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. J. J. P. Sipayung and J. Sembiring, “Risk assessment model of application development using Bayesian Network and Boehm's Software Risk Principles,” in Proceedings of the International Conference on Information Technology Systems and Innovation (ICITSI '15), pp. 1–5, IEEE, Bandung, Indonesia, November 2015. View at Publisher · View at Google Scholar
  7. M. Naderpour, J. Lu, and G. Zhang, “A fuzzy dynamic bayesian network-based situation assessment approach,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ '13), pp. 1–8, IEEE, Hyderabad, India, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. F.-W. Li, S. Sun, J. Zhu, and S.-C. Yang, “Situation assessment method based on hidden Markov model,” Computer Engineering and Design, vol. 36, no. 7, pp. 1706–1711, 2015. View at Google Scholar
  9. R. R. Xi, X. C. Yun, Y. Z. Zhang, and Z. Y. Hao, “An improved quantitative evaluation method for network security,” Chinese Journal of Computers, vol. 38, no. 4, pp. 749–758, 2015. View at Google Scholar · View at MathSciNet
  10. Y.-F. Wang, T. Li, X.-Q. Hu, and C. Song, “A real-time method of risk evaluation based on artificial immune system for network security,” Chinese Journal of Electronics, vol. 33, no. 5, pp. 945–949, 2005. View at Google Scholar
  11. N. Liu, S.-J. Liu, Y. Liu, and H. Zhao, “Method of network security situation awareness based on artificial immunity system,” Journal of Computer Science, vol. 37, no. 1, pp. 126–129, 2010. View at Google Scholar
  12. Z. Gao and X. Hu, “Design and implementation of real-time network risk control system based on antibody concentration,” Journal of Computer Applications, vol. 33, no. 10, pp. 2842–2845, 2013. View at Publisher · View at Google Scholar
  13. I. Kotenko and A. Chechulin, “A cyber attack modeling and impact assessment framework,” in Proceedings of the 5th International Conference on Cyber Conflict, pp. 1–24, Tallinn, Estonia, June 2013.
  14. M. Khosravi-Farmad, R. Rezaee, and A. G. Bafghi, “Considering temporal and environmental characteristics of vulnerabilities in network security risk assessment,” in Proceedings of the 11th International ISC Conference on Information Security and Cryptology (ISCISC '14), pp. 186–191, IEEE, Tehran, Iran, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. M. G. Ionita and V. V. Patriciu, “Biologically inspired risk assessment in cyber security using neural networks,” in Proceedings of the 10th International Conference on Communications (COMM '14), pp. 1–4, Bucharest, Romania, May 2014. View at Publisher · View at Google Scholar
  16. M. Rezvani, V. Sekulic, A. Ignjatovic, E. Bertino, and S. Jha, “Interdependent security risk analysis of hosts and flows,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2325–2339, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Hemanidhi, S. Chimmanee, and C. Kimpan, “Cyber risk evaluation framework based on risk environment of military operation,” in Proceedings of the 1st Asian Conference on Defence Technology (ACDT '15), pp. 42–47, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Wu, Y.-F. Lian, K. Chen, and Y. L. Liu, “A security threats identification and analysis method based on attack graph,” Chinese Journal of Computers, vol. 35, no. 9, pp. 1938–1950, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. Y.-L. Chen, G.-M. Tang, and Y.-F. Sun, “Assessment of network security situation based on immune danger theory,” Journal of Computer Science, vol. 42, no. 6, pp. 167–170, 2015. View at Google Scholar
  20. P. Gope and T. Hwang, “A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks,” IEEE Transactions on Industrial Electronics, 2016. View at Publisher · View at Google Scholar
  21. S. C. Mukhopadhyay, “Wearable sensors for human activity monitoring: a review,” IEEE Sensors Journal, vol. 15, no. 3, pp. 1321–1330, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. P. Gope and T. Hwang, “BSN-care: a secure IoT-based modern healthcare system using body sensor network,” IEEE Sensors Journal, vol. 16, no. 5, pp. 1368–1376, 2016. View at Google Scholar
  23. T. Li, “An immunity based network security risk estimation,” Science in China Series F: Information Sciences, vol. 48, no. 5, pp. 557–578, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. X. Feng, M.-Y. Ma, T.-L. Zhao, and H.-Q. Yu, “Intrusion detection system based on hybrid immune algorithm,” Journal of Computer Science, vol. 41, no. 12, pp. 43–47, 2014. View at Google Scholar