CN113222048A - Artificial immunity-based vaccination and vaccine data fusion method - Google Patents
Artificial immunity-based vaccination and vaccine data fusion method Download PDFInfo
- Publication number
- CN113222048A CN113222048A CN202110576244.4A CN202110576244A CN113222048A CN 113222048 A CN113222048 A CN 113222048A CN 202110576244 A CN202110576244 A CN 202110576244A CN 113222048 A CN113222048 A CN 113222048A
- Authority
- CN
- China
- Prior art keywords
- vaccine
- cells
- cell
- data
- self
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/25—Fusion techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses a vaccination and vaccine data fusion method based on artificial immunity, and aims to solve the technical problem that the traditional defense means cannot realize the cooperative work of multiple network nodes. The artificial immunity-based vaccination and vaccine data fusion method comprises the following steps: collecting vaccine cell data; securely encrypting and authenticating the vaccine cells; packaging and transmitting the vaccine data; vaccination and tolerance of the vaccine data; dynamic evolution of the vaccine cell database; forming a two-dimensional chain table of vaccine cells; the present invention further provides a computer-readable storage medium, comprising instructions, which when executed on a computer, cause the computer to perform the above-described artificial immunity-based vaccination and vaccine data fusion method. The method can realize the advance defense and the large-scale network cooperative defense of other network nodes after any detection node in the network discovers a new intrusion behavior, and improve the defense capability of the network nodes.
Description
Technical Field
The invention relates to the technical field of vaccination network security, in particular to a vaccination and vaccine data fusion method based on artificial immunity.
Background
In recent years, network security has become a hot spot of domestic and foreign research. The existing defense means, such as firewall, intrusion detection system, virus detection, Trojan horse detection, vulnerability scanning and other technologies are continuously perfected and gradually mature.
However, these traditional defense means cannot realize the cooperative work of multiple network nodes, and cannot achieve the effect of large-scale network cooperative defense. Meanwhile, as the threshold of the network intrusion technology is reduced, the number of network intrusion tools and intrusion means is infinite, the faced network attack behavior has unpredictability to a great extent, and how to carry out cooperative defense among network nodes becomes the key point of research on the network security at present.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a vaccination and vaccine data fusion method based on artificial immunity, so as to solve the technical problem that the traditional defense means cannot realize the cooperative work of multiple network nodes.
The invention provides a vaccine generation, vaccine safe transmission, vaccine inoculation and vaccine data fusion method based on the artificial immunity principle on the basis of artificial immunity, realizes the cooperative defense of different network nodes in a large-scale network environment through a vaccine inoculation technology, and improves the efficiency of the cooperative defense through a vaccine cell fusion mechanism. The technical idea for realizing the aim of the invention is as follows: and the memory cells are encapsulated into vaccine cells to be inoculated to other network nodes, so that the advance defense of other network nodes and the cooperative defense among different network nodes are realized. The invention defines the concept related to the vaccine and establishes a dynamic vaccination and data fusion model.
In order to solve the technical problems, the invention adopts the following technical scheme:
provides a vaccination and vaccine data fusion method based on artificial immunity, which comprises the following steps:
(1) collecting vaccine cell data represented in the form of:
Vd=<d,Pt,Nm,Dt>;
wherein d represents antibody data of vaccine cells; the Pt represents the age of the vaccine cells, and the initial value Pt is 0; the Nm represents the number of antigens recognized by the antibody d, i.e., an antigen match value; the Dt represents the invasion type of the vaccine cell defense;
(2) vaccine cells are safely encrypted and authenticated, a Vaccine Cell Secure Transport Protocol (VCSTP) is designed, and the safety of Vaccine data is guaranteed through an encryption algorithm and an authentication mechanism;
the VCSTP operates as follows:
wherein Vd is vaccine data, M is encryption data, GsK is a session key used in a conventional encryption scheme, PrpK is a private key of user a in a public key encryption scheme, PupK is a public key of user a in a public key encryption scheme, Hf is a hash function, and a hash function is applied to the public key of user a in a public key encryption schemeIs connected toThen, the Zi is compressed by ZIP algorithm, the R64 is converted into ASCII format of Base64, and the Zi is-1For decompression, ItR64-1For ItR64 reverse conversion, theFor comparison, the EPrpKFor decryption using the private key, EPupKFor decryption using a public key, said EGsKFor decryption using the session key;
formula (1) is an encryption process of using VCSTP protocol on the basis of session establishment of both communication parties; formulas (2), (3) and (4) are processes for realizing decryption and authentication by using the VCSTP protocol after the receiving party receives the encrypted data;
(3) packaging and transmitting the vaccine data;
the data packet message format of the vaccine cells is as follows:
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells by the inoculation address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table;
(4) vaccination and tolerance of the vaccine data;
the vaccine data are transmitted to an inoculation node, decrypted and authenticated through a VCSTP protocol, and the vaccine data are read; performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing an immunologically recognized vaccine;
the specific process is as follows:
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
self.Normalcell(t)={y1,y2,…,yn}#(8)
wherein V (t) is a set of vaccine cells inoculated at time t; vtolerance(t) is a vaccine cell set subjected to tolerance treatment at the time t; formula (5) describes the dynamic tolerization process of the vaccine cells at the vaccination node, alpha is the tolerization period of the vaccine cells and alpha > 0. In equation (6), Vdi=<di,0,Nmi,Dti>Is the vaccinating cell inoculated from the network by the node at time t (d is the same as {0, 1}kK, Nm > 0, 0 < i ≦ n, n > 0 and is an arbitrary constant). In the formula (7), V' (t) is V (t-1) to selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1。yiNormal is selfcellAnd (t) any autologous cells (i is more than 0 and less than or equal to n, n is more than 0 and is any constant), and as shown in (8), the cells have the common characteristic of not participating in the intrusion defense of the network node. V (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t);
(5) Inoculating data fusion between the vaccine cells;
the vaccine cell set V after the tolerance treatmenttolerance(t); according to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment;
the specific process is as follows:
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
Vcd(t) is the set of vaccine cells treated by the process of cell fusion of vaccination at time t; the vaccine cells satisfy Match (Vd)c.d,VddD) is 0, wherein Vdc,Vdd∈Vcd(t); formula (9) describes the fusion process between the vaccinated cells. V'tolerance(t) is Vtolerance(t-1) the pool of vaccine cells having the same defense function. In equation (10), Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells, if Vdq,VdsSatisfies Match (Vd)s.d,VdqD) to 1, indicating that the two vaccine cells have the same defense capacity, Vd was further comparedqNm and VdsNm size and retaining Nm larger vaccine cells. Vcd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)V′tolerance(t)∪Vcd(t):
(6) Dynamic evolution of the vaccine cell database;
according to Vcd(t) cell renewal of vaccine cells on cells self.vs of the vaccine cell bank of the vaccination node at d and Nm data bits of vaccine cells;
the process is as follows:
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=y.Pt+α}#(11)
self.Vs(t)={y1,y2,…,yη}#(13)
wherein, said self.Vscd(t) is the pool of vaccine cells treated by the renewal process at time t; equation (11) describes the update process of the vaccine cell bank; in particularThe updating process is as follows: vcd (t) with V 'removed'cdAfter (t), the remaining vaccine cells were added to self.vs (t). V'cd(t) is Vcd(t-1) and self.Vs (t-1) with the same defense capacity of the vaccine cell set, as shown in equation (12). If ylAnd Vd satisfies Match (Vd.d, y)lD) 1, vd.nm and y are further comparedlNm size, and retaining vaccine cells with larger Nm values. As shown in formula (13), ylVs (t), is any autologous vaccine cell, composed of quadruples, i.e. yl=<dl,Ptl,Nml,Dtl> (0 < l ≦ η, η > 0 and is arbitrary constant), the common feature of these autovaccine cells is the participation in the node invasion defense; vs. selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t);
(7) Forming a two-dimensional chain table of vaccine cells;
vs according to selfcd(t) performing Vaccine fusion on the Dt data bit and the d data bit of the Vaccine cell in the (t) to form a Two-Dimensional Linked List (TDLLoV) of the Vaccine cell, and storing the Two-Dimensional Linked List in a Vaccine cell bank;
the process is as follows:
wherein, said self.VsdDt(t) is the t-time node vaccine cell bank; formula (14) describes the vaccine cell profile of the vaccine cell bank at time t; when t is more than or equal to 1, the vaccines are fused to form a certain number of vaccine two-dimensional linked lists, and at the moment, the inoculation node has delta independent vaccine cells (which do not participate in the formation of the vaccine two-dimensional linked lists) and rho vaccine two-dimensional linked lists to participate in the safety prevention of the network node togetherYuzhong (delta, rho is more than or equal to 0). Wherein the content of the first and second substances, the values of different data bits of the two-dimensional chain table of the vaccine formed at the time t are shown as (15), wherein Y.d shows the result of mutually linking the antibodies of the vaccine cells with a certain relation; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cell; y of any one vaccine cell on two-dimensional chain tableρ.dωAfter identifying the invasion behavior, vaccine cells on the two-dimensional linked list of the vaccine participate in the invasion defense behavior together, so as to achieve the rapid defense of the invasion behavior; omega is the number of vaccine cells on Y;
(8) identifying an intrusion behavior;
vs. the vaccine cell bankdDt(t) after the vaccine cells find any invasion behavior in, carrying out immune recognition on the invasion behavior in time;
the process is as follows:
self.Vs(t)=self.VsdDt(t)#(16)
equation (16) describes the optimization of the vaccine cell bank at time t. Equations (17) and (18) describe the dynamic evolution of the participation of a single vaccine cell Y and a two-dimensional linked list of vaccine cells Y in the intrusion prevention behavior, respectively. In the formula (17), after the vaccine cell y identifies the invasion behavior in, if Match (y.d, in) is equal to 1, y.pt and y.nm are automatically added by one, and other values are kept unchanged. If Match (y.d, in) is 0 and y.pt > 0, then automatically decrementing y.pt by one, the other values remaining unchanged; if Match (y.d, in) is 0 and y.pt is 0, then it will beVaccine cells y were deleted from the vaccine cell bank self.vs (t). (18) In (b), Match (Y.d) is obtained after any vaccine cell on the two-dimensional chain Y recognizes the invasion behavior inξIf in) is 1, then adding one to the Y.Pt and Y.Nm values of the two-dimensional linked list automatically, and keeping other values unchanged; at the same time, y.pt of the vaccine cells identified in on the chainξAnd Y.NmξOne is added automatically, and other values are kept unchanged. If Match (Y.d)ξIn) 0 and y.ptξIf > 0, then Y.PtξAutomatically subtracting one, and keeping other values unchanged; if Match (Y.d)ξIn) 0 and y.ptξWhen the antibody value is 0, the antibody value Y.d of the vaccine cell is deleted from the two-dimensionally linked antibody value Y.dξAnd deleting the antibody type Y.Dt of the vaccine cell from the antibody type Y.Dt of the two-dimensional linked listξThe other values remain unchanged.
Preferably, in the step (1), the invasion type of the vaccine cells is at least one of DoS, R2L, U2R and Probe.
Preferably, in the step (3), the data recorded in the vaccine cell forwarding address table is:
inoculation network number | Distance between two adjacent plates | Next network number |
The vaccination network number is a vaccination address of the vaccine cell, the distance is the network hop number required to pass between the vaccine production node and the vaccination node, and the next network number is the next path of the vaccine cell when the vaccine cell is transmitted in the network; the vaccine cell forwarding address table is stored at a vaccine generation node.
Preferably, in the steps (4), (5), (6) and (8), the Match matching function is euclidean distance matching, and the matching is specifically performed by the following formula:
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
Preferably, in said steps (4), (6), (7) and (8), the cell self comprises a collection of cells as follows:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
normal, wherein said selfcellIs a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
There is also provided a computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the artificial immunity-based vaccination and vaccine data fusion method described above.
Compared with the prior art, the invention has the beneficial technical effects that:
1. according to the artificial immunity-based vaccination and vaccine data fusion method, after a new invasion behavior is found at any detection node in the network, the data characteristics of the invasion behavior are transmitted to other network nodes through the vaccination method, so that advance defense and large-scale network cooperative defense of other network nodes are realized.
2. The method for the artificial immunity-based vaccination and the data fusion of the vaccine realizes the data fusion of the vaccinated vaccine cells and the autologous vaccine cells, thereby realizing the dynamic update of the autologous vaccine cell bank.
3. In the artificial immunity-based vaccine inoculation and vaccine data fusion method, vaccine cells are fused to form a two-dimensional linked list, so that the defense capacity of the network node is improved.
Drawings
FIG. 1 is a flowchart of a vaccination procedure according to an embodiment of the present invention.
Detailed Description
The following examples are intended to illustrate the present invention in detail and should not be construed as limiting the scope of the present invention in any way.
Example (b): artificial immunity-based vaccination and vaccine data fusion method
On the basis of artificial immunity and biological vaccination, a vaccination method among network nodes is provided to realize rapid cooperative defense of the network nodes on invasion behaviors.
The cooperative defense technology based on vaccination mainly aims at enabling a detection node to carry out immune recognition on an invasion once the invasion is found at the certain invasion detection node, finally forming vaccine cells, enabling a vaccination node in a network to have the vaccine cells aiming at the invasion through the vaccination technology, and enabling the vaccination node to rapidly recognize the invasion at the moment so as to realize cooperative defense of a large-scale network on the invasion.
Referring to fig. 1, the specific steps are as follows:
(1) production of vaccine cells
Data characteristics of memory cells of network nodes: after cloning of the antibody d, the number Nm of antigen matches, the age Pt, and the invasion type Dt of defense, the vaccine cells were encapsulated, and the age Pt of the vaccine cells was set to 0.
The vaccine cell data are expressed as: vd ═ d, Pt, Nm, Dt >.
(2) Vaccine cell encryption
1) Setting vaccine cell data as Vd, obtaining a Hash function value Hf (Vd) of the Vd through a Hash function Hash, and then encrypting the Hf (Vd) through a private key of a vaccine generation network node in an encryption scheme;
2) merging and connecting the Vd and the result of 1), and compressing data; encrypting the compressed data by using a session key used in a conventional encryption scheme;
3) encrypting the session key used in the conventional encryption scheme by the public key of the vaccine generation network node in the encryption scheme, merging and connecting with the result of 2), and then converting into ASCII format of Base64 by ItR64 and naming M;
the specific operation is as follows:
(3) encapsulation and transmission of vaccine information
The packet message format for vaccine cells is defined as follows:
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells from the vaccination address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table.
(4) Decryption and authentication of vaccine data
After the data packet M is transmitted to the inoculation network node through the step (3), decrypting the data packet M at the inoculation node to obtain transmission data Vd and PrpK (Hf (Vd)); obtaining a Hash function value Hf (Vd) of the vaccine cells and data E decrypted by using a private key at the inoculation node through a Hash function HashPrpK(PrpK (Hf (Vd))) was compared. If the data of the two are consistent, receiving the vaccine cells, otherwise deleting the vaccine cells;
the specific operation is as follows:
(5) vaccination and tolerance of vaccine data
And transmitting the encrypted data to the inoculation node, decrypting and authenticating the encrypted data through a VCSTP protocol, and reading vaccine data. Performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing vaccines for immunological recognition.
The matching function Match is euclidean distance matching and is matched by the following formula:
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
The set of cells predominantly comprised by autologous cell self is as follows:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
self.Normalcellis a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
a) V (t) is the pool of vaccine cells inoculated at time t;
b)Vtolerance(t) is the pool of vaccine cells that have undergone a tolerization treatment at time t.
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
self.Normalcell(t)={y1,y2,…,yn}#(8)
Formula (5) describes the dynamic tolerization process of the vaccine cells at the vaccination node, alpha is the tolerization period of the vaccine cells and alpha > 0. In equation (6), Vdi=<di,0,Nmi,DtiIs the vaccinating cell inoculated from the network at the time t (d.epsilon. {0, 1}kK, Nm > 0, 0 < i ≦ n, n > 0 and is an arbitrary constant). In the formula (7), V' (t) is V (t-1) to selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1。yiNormal is selfcellAnd (t) any autologous cells (i is more than 0 and less than or equal to n, n is more than 0 and is any constant), and as shown in (8), the cells have the common characteristic of not participating in the intrusion defense of the network node. V (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t)。
(6) Data fusion of vaccinated cells
Vaccine cell pool after tolerization Vtolerance(t) of (d). According to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment.
Vcd(t) is the set of vaccine cells that was treated by the process of cell fusion at time t. These vaccine cells satisfy Match (Vd)c.d,VddD) 0, wherein Vdc,Vdd∈Vcd(t)。
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
Formula (9) describes vaccination of cellsAnd (3) fusing. V'tolerance(t) is Vtolerance(t1) the pool of vaccine cells with the same defense function. In equation (10), Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells, if Vdq,VdsSatisfies Match (Vd)s.d,VdqD) to 1, indicating that the two vaccine cells have the same defense capacity, Vd was further comparedqNm and VdsNm size and retaining Nm larger vaccine cells. Vcd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)=V′tolerance(t)∪Vcd(t)。
(7) Dynamic evolution of vaccine cell databases
The set of vaccinating cells after the fusion treatment was Vcd(t) of (d). According to VcdD and Nm data bits of vaccine cells in (t) vaccine cell renewal was performed on cells self.vs of the vaccine cell bank of the vaccination node.
self.Vscd(t) is the set of vaccine cells treated by the renewal process at time t.
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=yPt+α}#(11)
self.Vs(t)={y1,y2,…,yη}#(13)
Equation (11) describes the update process of the vaccine cell bank. The specific updating process is as follows: vcd(t) removing V'cdAfter (t), the remaining vaccine cells were added to self.vs (t). V'cd(t) is Vcd(t-1) and self.Vs (t-1) with the same defense capacity of the vaccine cell set, as shown in equation (12). If ylAnd Vd satisfies Match (Vd.d, y)lD) 1, vd.nm and y are further comparedlMm, and retain vaccine cells with larger Nm values. As shown in formula (13), ylVs (t), is any autologous vaccine cell, composed of quadruples, i.e. yl=<dl,Ptl,Nml,Dtl> (0 < l.ltoreq.eta. > 0 and is an arbitrary constant), these autovaccine cells have in common the feature of participating in the invasion defense of the node. Vs. selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t)。
(8) Form a two-dimensional chain table of vaccine cells
Vs. the pool of vaccine cells in the vaccine cell bank at time t after the end of the renewal operation was selfcd(t) of (d). Vs according to selfcdAnd (t) performing Vaccine fusion on the Dt data bit and the d data bit of the Vaccine cell to form a Two-Dimensional Linked List (TDLLoV) of the Vaccine cell, and storing the Two-Dimensional Linked List in a Vaccine cell bank.
self.VsdDt(t) is the t-time node vaccine cell bank.
Equation (14) describes the vaccine cell profile of the vaccine cell bank at time t. When t is larger than or equal to 1, vaccines are fused to form a certain number of vaccine two-dimensional linked lists, and at the moment, the vaccination node has delta independent vaccine cells (which do not participate in the formation of the vaccine two-dimensional linked lists) and rho vaccine two-dimensional linked lists jointly participate in the safety defense of the network node (delta, rho is larger than or equal to 0). Wherein the content of the first and second substances, different data bits of vaccine two-dimensional linked list formed at t momentThe value of (4) as shown in (15), wherein Y.d represents the result of linking the antibodies of vaccine cells having a certain relationship to each other; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cells. Y of any one vaccine cell on two-dimensional chain tableρ.dωAfter identifying the invasion behavior, vaccine cells on the two-dimensional linked list of the vaccine participate in the invasion defense behavior together, so as to achieve the rapid defense of the invasion behavior.
(9) Identification of intrusion behavior
Vs. vaccine cell bank selfdDtAnd (t) after the vaccine cells find any invasion behaviors in, carrying out immune recognition on the invasion behaviors in time.
self.Vs(t)=self.VsdDt(t)#(16)
Equation (16) describes the optimization of the vaccine cell bank at time t. Equations (17) and (18) describe the dynamic evolution of the participation of a single vaccine cell Y and a two-dimensional linked list of vaccine cells Y in the intrusion prevention behavior, respectively. (17) In (3), after identifying the invasion behavior in, if Match (y.d, in) is 1, then y.Pt and y.Nm are automatically added by one, and other values are kept unchanged. If Match (y.d, in) is 0 and y.pt > 0, then automatically decrementing y.pt by one, the other values remaining unchanged; if Match (y.d, in) is 0 and y.pt is 0, then the vaccine cells y are deleted from the vaccine cell bank self.vs (t). (18) In (b), Match (Y.d) is obtained after any vaccine cell on the two-dimensional chain Y recognizes the invasion behavior inξIf in) is 1, then adding one to the Y.Pt and Y.Nm values of the two-dimensional linked list automatically, and keeping other values unchanged; at the same time, y.pt of the vaccine cells identified in on the chainξAnd Y.NmξOne is added automatically, and other values are kept unchanged. If Match (Y.d)ξIn) 0 and y.ptξIf > 0, then Y.PtξAutomatically subtracting one, and keeping other values unchanged; if Match (Y.d)ξIn) 0 and y.ptξWhen the antibody value is 0, the antibody value Y.d of the vaccine cell is deleted from the two-dimensionally linked antibody value Y.dξAnd deleting the antibody type Y.Dt of the vaccine cell from the antibody type Y.Dt of the two-dimensional linked listξThe other values remain unchanged.
In conclusion, the invention is applied to network security defense by simulating the immune mechanism of organisms to viruses and bacteria and the vaccination principle. The method comprises the following implementation steps: the memory cells of the network nodes are packaged into transmissible vaccine cells; the vaccine cells are transmitted to the inoculation node by using a safe transmission protocol; performing immune tolerance on the inoculated vaccine cells at the inoculation node; the vaccine cells from different network nodes are fused with each other according to the matching degree, so that the uniqueness of the vaccine cells is ensured; updating the data of the vaccine cell bank of the inoculation node according to the fusion result; and fusing the vaccine cells according to the antibody and the type value of the vaccine cells to form a two-dimensional linked list of the vaccine cells.
The invention constructs the vaccine cell safe transmission protocol VCSTP, which ensures the safety of the vaccine cell in the transmission process; providing a vaccination method of the vaccine cells, and describing a dynamic evolution process of the vaccinated cells; the fusion method between vaccine cells is provided, and the dynamic update process of a vaccine cell bank is described; and a process for forming a two-dimensional linked list of vaccine cells is provided, and the defense capability of the network node is improved. And the rapid cooperative defense of different network nodes on the intrusion attack behavior in the network can be realized.
The vaccination and vaccine data fusion method based on artificial immunity is applied to the cooperative defense of a large-scale network against invasion attacks, after any detection node in the network immunologically recognizes a new invasion behavior, relevant data such as an antibody of the invasion behavior and the like are packaged into vaccine cells, and the vaccine cells are transmitted to other network nodes through a safe transmission protocol, so that the cooperative defense of the large-scale network against the invasion behavior is realized; the inoculated vaccine cells and the autologous vaccine cells realize data fusion, and dynamic update of an autologous vaccine cell bank is realized; vaccine cells are fused to form a two-dimensional linked list, so that the defense capacity of the network node is improved.
While the present invention has been described in detail with reference to the drawings and the embodiments, those skilled in the art will understand that various specific parameters in the above embodiments can be changed without departing from the spirit of the present invention, and a plurality of specific embodiments are formed, which are common variation ranges of the present invention, and will not be described in detail herein.
Claims (6)
1. A vaccination and vaccine data fusion method based on artificial immunity is characterized by comprising the following steps:
(1) collecting vaccine cell data;
the vaccine cell data are expressed as:
Vd=<d,Pt,Nm,Dt>;
wherein d is antibody data of the vaccine cells; the Pt is the age of the vaccine cells, and the initial value Pt is 0; the Nm is the number of antigens recognized by the antibody d; the Dt is an invasion type of vaccine cell defense;
(2) securely encrypting and authenticating the vaccine cells;
designing VCSTP, and ensuring the safety of the vaccine data through an encryption algorithm and an authentication mechanism;
the VCSTP operates as follows:
wherein Vd is vaccine data, M is encryption data, GsK is a session key used in a conventional encryption scheme, PrpK is a private key of user a in a public key encryption scheme, PupK is a public key of user a in a public key encryption scheme, Hf is a hash function, and a hash function is applied to the public key of user a in a public key encryption schemeFor concatenation, Zi is compressed using ZIP algorithm, R64 is converted to ASCII format from Base64, Zi-1 is decompressed, ItR64-1For ItR64 reverse conversion, theFor comparison, the EPrpKFor decryption using the private key, EPupKFor decryption using a public key, said EGsKFor decryption using the session key;
(3) packaging and transmitting the vaccine data;
the data packet message format of the vaccine cells is as follows:
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells by the inoculation address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table;
(4) vaccination and tolerance of the vaccine data;
the vaccine data are transmitted to an inoculation node, decrypted and authenticated through VCSTP, and the vaccine data are read;performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing an immunologically recognized vaccine;
the specific process is as follows:
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
self.Normalcell(t)={y1,y2,…,yn}#(8)
wherein V (t) is a set of vaccine cells inoculated at time t; vtolerance(t) is a vaccine cell set subjected to tolerance treatment at the time t; alpha is the tolerance period of the vaccine cells and alpha is more than 0; vdi=<di,0,Nmi,Dti>Vaccinal cells vaccinated from the network for the time t node; v' (t) is V (t-1) vs selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1;yiIs selfcell(t) any autologous cell (i is more than 0 and less than or equal to n, n is more than 0 and is any constant); v (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t);
(5) Data fusion between the vaccinated cells;
according to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment;
the specific process is as follows:
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
wherein, the Vcd(t) is the set of vaccine cells treated by the process of cell fusion of vaccination at time t; vcd(t) the vaccine cells meet Match (Vd)c.d,VddD) 0, wherein Vdc,Vdd∈Vcd(t); v'tolerance(t) is Vtolerance(t-1) the pool of vaccine cells having the same defense function; said Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells; the V iscd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)=V′tolerance(t)∪Vcd(t);
(6) Dynamic evolution of the vaccine cell database;
according to Vcd(t) cell renewal of vaccine cells on cells self.vs of the vaccine cell bank of the vaccination node at d and Nm data bits of vaccine cells;
the process is as follows:
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=y.Pt+α}#(11)
self.Vs(t)={y1,y2,…,yη}#(13)
wherein, said self.Vscd(t) is the pool of vaccine cells treated by the renewal process at time t; v'cd(t) is Vcd(t-1) a pool of vaccine cells with the same capacity of defense as in self.vs (t-1); said ylVs (t), is any autologous vaccine cell; vs. said selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t);
(7) Forming a two-dimensional chain table of vaccine cells;
vs according to selfcd(t) performing vaccine fusion on the Dt data bit and the d data bit of the vaccine cell in the step (t) to form a vaccine cell two-dimensional linked list TDLLoV, and storing the vaccine cell two-dimensional linked list TDLLoV in a vaccine cell database;
the process is as follows:
wherein, said self.VsdDt(t) is the t-time node vaccine cell bank; δ is the number of independent vaccine cells; rho is the number of the two-dimensional linked lists of the vaccines; y.d is the result of linking the antibodies of the vaccine cells having a relationship to each other; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cells; omega is the number of vaccine cells on Y;
(8) identifying an intrusion behavior;
vs. the vaccine cell bankdDt(t) after the vaccine cells find any invasion behaviors, carrying out immune recognition on the invasion behaviors in time;
the process is as follows:
self.Vs(t)=self.VsdDt(t)#(16)
wherein y is a single epidemic involved in intrusion preventionSeeding cells; y is a two-dimensional chain table of vaccine cells participating in invasion defense; in is an invasion behavior; ptξAge of vaccine cell xi on Y; nmξThe number of antigens that are vaccine cell xi on Y; dξAntibody data for vaccine cell xi on Y; dtξIs the invasion type of vaccine cell xi defense on Y.
2. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (1), the invasion type of the vaccine cells is at least one of DoS, R2L, U2R and Probe.
3. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (3), the data recorded by the vaccine cell forwarding address table is:
The vaccination network number is a vaccination address of the vaccine cell, the distance is the network hop number required to pass between the vaccine production node and the vaccination node, and the next network number is the next path of the vaccine cell when the vaccine cell is transmitted in the network; the vaccine cell forwarding address table is stored at a vaccine generation node.
4. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (4), the Match matching function is Euclidean distance matching, and is specifically matched according to the following formula:
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
5. The artificial immunity-based vaccination and vaccination data fusion method according to claim 1, wherein in step (4), the cells self comprise the following cell aggregates:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
normal, wherein said selfcellIs a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
6. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the artificial immunity-based vaccination and vaccine data fusion method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110576244.4A CN113222048B (en) | 2021-05-26 | 2021-05-26 | Artificial immunity-based vaccination and vaccine data fusion method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110576244.4A CN113222048B (en) | 2021-05-26 | 2021-05-26 | Artificial immunity-based vaccination and vaccine data fusion method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113222048A true CN113222048A (en) | 2021-08-06 |
CN113222048B CN113222048B (en) | 2023-02-17 |
Family
ID=77098524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110576244.4A Active CN113222048B (en) | 2021-05-26 | 2021-05-26 | Artificial immunity-based vaccination and vaccine data fusion method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113222048B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030084329A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits |
CN101299691A (en) * | 2008-06-13 | 2008-11-05 | 南京邮电大学 | Method for detecting dynamic gridding instruction based on artificial immunity |
US20090125755A1 (en) * | 2005-07-14 | 2009-05-14 | Gryphonet Ltd. | System and method for detection and recovery of malfunction in mobile devices |
US20110262468A1 (en) * | 2010-04-23 | 2011-10-27 | Nodality, Inc. | Method for Monitoring Vaccine Response Using Single Cell Network Profiling |
CN102420824A (en) * | 2011-11-30 | 2012-04-18 | 中国科学院微电子研究所 | Restructurable Internet of things node intrusion detection method |
CN105933301A (en) * | 2016-04-13 | 2016-09-07 | 重庆邮电大学 | SDN based concentrated network worm prevention-control method and device |
CN107046549A (en) * | 2017-05-31 | 2017-08-15 | 郑州轻工业学院 | Based on immune Internet of Things Novel Distributed Intrusion Detection Method and system |
CN110188547A (en) * | 2019-05-14 | 2019-08-30 | 北京可信华泰信息技术有限公司 | A kind of credible encryption system and method |
CN111259416A (en) * | 2020-01-13 | 2020-06-09 | 湖北大学 | Multi-algorithm security encryption authentication system and method based on FPGA |
-
2021
- 2021-05-26 CN CN202110576244.4A patent/CN113222048B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030084329A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits |
US20090125755A1 (en) * | 2005-07-14 | 2009-05-14 | Gryphonet Ltd. | System and method for detection and recovery of malfunction in mobile devices |
CN101299691A (en) * | 2008-06-13 | 2008-11-05 | 南京邮电大学 | Method for detecting dynamic gridding instruction based on artificial immunity |
US20110262468A1 (en) * | 2010-04-23 | 2011-10-27 | Nodality, Inc. | Method for Monitoring Vaccine Response Using Single Cell Network Profiling |
CN102420824A (en) * | 2011-11-30 | 2012-04-18 | 中国科学院微电子研究所 | Restructurable Internet of things node intrusion detection method |
CN105933301A (en) * | 2016-04-13 | 2016-09-07 | 重庆邮电大学 | SDN based concentrated network worm prevention-control method and device |
CN107046549A (en) * | 2017-05-31 | 2017-08-15 | 郑州轻工业学院 | Based on immune Internet of Things Novel Distributed Intrusion Detection Method and system |
CN110188547A (en) * | 2019-05-14 | 2019-08-30 | 北京可信华泰信息技术有限公司 | A kind of credible encryption system and method |
CN111259416A (en) * | 2020-01-13 | 2020-06-09 | 湖北大学 | Multi-algorithm security encryption authentication system and method based on FPGA |
Non-Patent Citations (4)
Title |
---|
YAPING J.等: "Intrusion Prevention System Base on Immune Vaccination", 《2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION》 * |
于全 等: "类生物免疫机制的网络安全架构", 《网络空间安全》 * |
蒋亚平 等: "基于疫苗算子的入侵检测模型", 《计算机工程与设计》 * |
郑凯元等: "基于多智能体的自动免疫接种模型", 《计算机工程与应用》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113222048B (en) | 2023-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104408177B (en) | Cipher text retrieval method based on cloud document system | |
WO2021208690A1 (en) | Method and apparatus for data encryption and decryption, device, and storage medium | |
CN110719165B (en) | Block chain distributed dynamic network key generation and encryption method | |
CN112532613B (en) | Hidden communication method based on block chain address | |
CN109327308B (en) | Quantum key distribution method and system with bidirectional identity authentication function | |
CN111209591B (en) | Storage structure sorted according to time and quick query method | |
CN111709058B (en) | Data integrity checking method based on identity and ring signature | |
CN105141602A (en) | File ownership proof method based on convergence encryption | |
CN110138543B (en) | Blind signcryption method under lattice public key cryptosystem | |
Safavi-Naini et al. | New results on multi-receiver authentication codes | |
CN101980558A (en) | Method for encryption authentication on Ad hoc network transmission layer protocol | |
CN108809637A (en) | The car-ground communication Non-Access Stratum authentication key agreement methods of LTE-R based on mixed cipher | |
CN106506453A (en) | Electric power big data transmission method and system based on Rapid matching and integrity detection | |
CN114338038B (en) | Storage system for secret inquiry of block chain data and careless transmission method | |
CN113222048B (en) | Artificial immunity-based vaccination and vaccine data fusion method | |
CN107425955A (en) | A kind of identity base graded encryption method on lattice that can efficiently fix the derivation of dimension trapdoor | |
CN114244498A (en) | Dynamic searchable public key encryption method with forward security | |
WO2019196237A1 (en) | Resident household registration information management method, server and computer readable storage medium | |
CN115296857A (en) | Network threat sensing and immunization method based on topological structure and deep learning-AIS | |
CN113204788B (en) | Fine granularity attribute matching privacy protection method | |
US7831998B2 (en) | Changing states of communication links in computer networks in an authenticated manner | |
Shanthini et al. | Multimodal biometric-based secured authentication system using steganography | |
CN106357410A (en) | Method for building subliminal channel on lattice signature without one-way trap door | |
CN103856939B (en) | Two-stage identity authentication method based on random number | |
Tea | Unmasking Concealed 5G Privacy Identity with Machine Learning and GPU in 12 mins |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |