CN113222048A - Artificial immunity-based vaccination and vaccine data fusion method - Google Patents

Artificial immunity-based vaccination and vaccine data fusion method Download PDF

Info

Publication number
CN113222048A
CN113222048A CN202110576244.4A CN202110576244A CN113222048A CN 113222048 A CN113222048 A CN 113222048A CN 202110576244 A CN202110576244 A CN 202110576244A CN 113222048 A CN113222048 A CN 113222048A
Authority
CN
China
Prior art keywords
vaccine
cells
cell
data
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110576244.4A
Other languages
Chinese (zh)
Other versions
CN113222048B (en
Inventor
蒋亚平
张云翼
张安康
蒋居政
黎星
倪子浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN202110576244.4A priority Critical patent/CN113222048B/en
Publication of CN113222048A publication Critical patent/CN113222048A/en
Application granted granted Critical
Publication of CN113222048B publication Critical patent/CN113222048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a vaccination and vaccine data fusion method based on artificial immunity, and aims to solve the technical problem that the traditional defense means cannot realize the cooperative work of multiple network nodes. The artificial immunity-based vaccination and vaccine data fusion method comprises the following steps: collecting vaccine cell data; securely encrypting and authenticating the vaccine cells; packaging and transmitting the vaccine data; vaccination and tolerance of the vaccine data; dynamic evolution of the vaccine cell database; forming a two-dimensional chain table of vaccine cells; the present invention further provides a computer-readable storage medium, comprising instructions, which when executed on a computer, cause the computer to perform the above-described artificial immunity-based vaccination and vaccine data fusion method. The method can realize the advance defense and the large-scale network cooperative defense of other network nodes after any detection node in the network discovers a new intrusion behavior, and improve the defense capability of the network nodes.

Description

Artificial immunity-based vaccination and vaccine data fusion method
Technical Field
The invention relates to the technical field of vaccination network security, in particular to a vaccination and vaccine data fusion method based on artificial immunity.
Background
In recent years, network security has become a hot spot of domestic and foreign research. The existing defense means, such as firewall, intrusion detection system, virus detection, Trojan horse detection, vulnerability scanning and other technologies are continuously perfected and gradually mature.
However, these traditional defense means cannot realize the cooperative work of multiple network nodes, and cannot achieve the effect of large-scale network cooperative defense. Meanwhile, as the threshold of the network intrusion technology is reduced, the number of network intrusion tools and intrusion means is infinite, the faced network attack behavior has unpredictability to a great extent, and how to carry out cooperative defense among network nodes becomes the key point of research on the network security at present.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a vaccination and vaccine data fusion method based on artificial immunity, so as to solve the technical problem that the traditional defense means cannot realize the cooperative work of multiple network nodes.
The invention provides a vaccine generation, vaccine safe transmission, vaccine inoculation and vaccine data fusion method based on the artificial immunity principle on the basis of artificial immunity, realizes the cooperative defense of different network nodes in a large-scale network environment through a vaccine inoculation technology, and improves the efficiency of the cooperative defense through a vaccine cell fusion mechanism. The technical idea for realizing the aim of the invention is as follows: and the memory cells are encapsulated into vaccine cells to be inoculated to other network nodes, so that the advance defense of other network nodes and the cooperative defense among different network nodes are realized. The invention defines the concept related to the vaccine and establishes a dynamic vaccination and data fusion model.
In order to solve the technical problems, the invention adopts the following technical scheme:
provides a vaccination and vaccine data fusion method based on artificial immunity, which comprises the following steps:
(1) collecting vaccine cell data represented in the form of:
Vd=<d,Pt,Nm,Dt>;
wherein d represents antibody data of vaccine cells; the Pt represents the age of the vaccine cells, and the initial value Pt is 0; the Nm represents the number of antigens recognized by the antibody d, i.e., an antigen match value; the Dt represents the invasion type of the vaccine cell defense;
(2) vaccine cells are safely encrypted and authenticated, a Vaccine Cell Secure Transport Protocol (VCSTP) is designed, and the safety of Vaccine data is guaranteed through an encryption algorithm and an authentication mechanism;
the VCSTP operates as follows:
Figure BDA0003084445640000021
Figure BDA0003084445640000022
Figure BDA0003084445640000023
Figure BDA0003084445640000024
wherein Vd is vaccine data, M is encryption data, GsK is a session key used in a conventional encryption scheme, PrpK is a private key of user a in a public key encryption scheme, PupK is a public key of user a in a public key encryption scheme, Hf is a hash function, and a hash function is applied to the public key of user a in a public key encryption scheme
Figure BDA0003084445640000027
Is connected toThen, the Zi is compressed by ZIP algorithm, the R64 is converted into ASCII format of Base64, and the Zi is-1For decompression, ItR64-1For ItR64 reverse conversion, the
Figure BDA0003084445640000025
For comparison, the EPrpKFor decryption using the private key, EPupKFor decryption using a public key, said EGsKFor decryption using the session key;
formula (1) is an encryption process of using VCSTP protocol on the basis of session establishment of both communication parties; formulas (2), (3) and (4) are processes for realizing decryption and authentication by using the VCSTP protocol after the receiving party receives the encrypted data;
(3) packaging and transmitting the vaccine data;
the data packet message format of the vaccine cells is as follows:
Figure BDA0003084445640000026
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells by the inoculation address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table;
(4) vaccination and tolerance of the vaccine data;
the vaccine data are transmitted to an inoculation node, decrypted and authenticated through a VCSTP protocol, and the vaccine data are read; performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing an immunologically recognized vaccine;
the specific process is as follows:
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
Figure BDA0003084445640000031
Figure BDA0003084445640000032
self.Normalcell(t)={y1,y2,…,yn}#(8)
wherein V (t) is a set of vaccine cells inoculated at time t; vtolerance(t) is a vaccine cell set subjected to tolerance treatment at the time t; formula (5) describes the dynamic tolerization process of the vaccine cells at the vaccination node, alpha is the tolerization period of the vaccine cells and alpha > 0. In equation (6), Vdi=<di,0,Nmi,Dti>Is the vaccinating cell inoculated from the network by the node at time t (d is the same as {0, 1}kK, Nm > 0, 0 < i ≦ n, n > 0 and is an arbitrary constant). In the formula (7), V' (t) is V (t-1) to selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1。yiNormal is selfcellAnd (t) any autologous cells (i is more than 0 and less than or equal to n, n is more than 0 and is any constant), and as shown in (8), the cells have the common characteristic of not participating in the intrusion defense of the network node. V (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t);
(5) Inoculating data fusion between the vaccine cells;
the vaccine cell set V after the tolerance treatmenttolerance(t); according to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment;
the specific process is as follows:
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
Figure BDA0003084445640000033
Vcd(t) is the set of vaccine cells treated by the process of cell fusion of vaccination at time t; the vaccine cells satisfy Match (Vd)c.d,VddD) is 0, wherein Vdc,Vdd∈Vcd(t); formula (9) describes the fusion process between the vaccinated cells. V'tolerance(t) is Vtolerance(t-1) the pool of vaccine cells having the same defense function. In equation (10), Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells, if Vdq,VdsSatisfies Match (Vd)s.d,VdqD) to 1, indicating that the two vaccine cells have the same defense capacity, Vd was further comparedqNm and VdsNm size and retaining Nm larger vaccine cells. Vcd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)V′tolerance(t)∪Vcd(t):
(6) Dynamic evolution of the vaccine cell database;
according to Vcd(t) cell renewal of vaccine cells on cells self.vs of the vaccine cell bank of the vaccination node at d and Nm data bits of vaccine cells;
the process is as follows:
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=y.Pt+α}#(11)
Figure BDA0003084445640000041
self.Vs(t)={y1,y2,…,yη}#(13)
wherein, said self.Vscd(t) is the pool of vaccine cells treated by the renewal process at time t; equation (11) describes the update process of the vaccine cell bank; in particularThe updating process is as follows: vcd (t) with V 'removed'cdAfter (t), the remaining vaccine cells were added to self.vs (t). V'cd(t) is Vcd(t-1) and self.Vs (t-1) with the same defense capacity of the vaccine cell set, as shown in equation (12). If ylAnd Vd satisfies Match (Vd.d, y)lD) 1, vd.nm and y are further comparedlNm size, and retaining vaccine cells with larger Nm values. As shown in formula (13), ylVs (t), is any autologous vaccine cell, composed of quadruples, i.e. yl=<dl,Ptl,Nml,Dtl> (0 < l ≦ η, η > 0 and is arbitrary constant), the common feature of these autovaccine cells is the participation in the node invasion defense; vs. selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t);
(7) Forming a two-dimensional chain table of vaccine cells;
vs according to selfcd(t) performing Vaccine fusion on the Dt data bit and the d data bit of the Vaccine cell in the (t) to form a Two-Dimensional Linked List (TDLLoV) of the Vaccine cell, and storing the Two-Dimensional Linked List in a Vaccine cell bank;
the process is as follows:
Figure BDA0003084445640000042
Figure BDA0003084445640000051
wherein, said self.VsdDt(t) is the t-time node vaccine cell bank; formula (14) describes the vaccine cell profile of the vaccine cell bank at time t; when t is more than or equal to 1, the vaccines are fused to form a certain number of vaccine two-dimensional linked lists, and at the moment, the inoculation node has delta independent vaccine cells (which do not participate in the formation of the vaccine two-dimensional linked lists) and rho vaccine two-dimensional linked lists to participate in the safety prevention of the network node togetherYuzhong (delta, rho is more than or equal to 0). Wherein the content of the first and second substances,
Figure BDA0003084445640000052
Figure BDA0003084445640000053
the values of different data bits of the two-dimensional chain table of the vaccine formed at the time t are shown as (15), wherein Y.d shows the result of mutually linking the antibodies of the vaccine cells with a certain relation; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cell; y of any one vaccine cell on two-dimensional chain tableρ.dωAfter identifying the invasion behavior, vaccine cells on the two-dimensional linked list of the vaccine participate in the invasion defense behavior together, so as to achieve the rapid defense of the invasion behavior; omega is the number of vaccine cells on Y;
(8) identifying an intrusion behavior;
vs. the vaccine cell bankdDt(t) after the vaccine cells find any invasion behavior in, carrying out immune recognition on the invasion behavior in time;
the process is as follows:
self.Vs(t)=self.VsdDt(t)#(16)
Figure BDA0003084445640000054
Figure BDA0003084445640000055
equation (16) describes the optimization of the vaccine cell bank at time t. Equations (17) and (18) describe the dynamic evolution of the participation of a single vaccine cell Y and a two-dimensional linked list of vaccine cells Y in the intrusion prevention behavior, respectively. In the formula (17), after the vaccine cell y identifies the invasion behavior in, if Match (y.d, in) is equal to 1, y.pt and y.nm are automatically added by one, and other values are kept unchanged. If Match (y.d, in) is 0 and y.pt > 0, then automatically decrementing y.pt by one, the other values remaining unchanged; if Match (y.d, in) is 0 and y.pt is 0, then it will beVaccine cells y were deleted from the vaccine cell bank self.vs (t). (18) In (b), Match (Y.d) is obtained after any vaccine cell on the two-dimensional chain Y recognizes the invasion behavior inξIf in) is 1, then adding one to the Y.Pt and Y.Nm values of the two-dimensional linked list automatically, and keeping other values unchanged; at the same time, y.pt of the vaccine cells identified in on the chainξAnd Y.NmξOne is added automatically, and other values are kept unchanged. If Match (Y.d)ξIn) 0 and y.ptξIf > 0, then Y.PtξAutomatically subtracting one, and keeping other values unchanged; if Match (Y.d)ξIn) 0 and y.ptξWhen the antibody value is 0, the antibody value Y.d of the vaccine cell is deleted from the two-dimensionally linked antibody value Y.dξAnd deleting the antibody type Y.Dt of the vaccine cell from the antibody type Y.Dt of the two-dimensional linked listξThe other values remain unchanged.
Preferably, in the step (1), the invasion type of the vaccine cells is at least one of DoS, R2L, U2R and Probe.
Preferably, in the step (3), the data recorded in the vaccine cell forwarding address table is:
inoculation network number Distance between two adjacent plates Next network number
The vaccination network number is a vaccination address of the vaccine cell, the distance is the network hop number required to pass between the vaccine production node and the vaccination node, and the next network number is the next path of the vaccine cell when the vaccine cell is transmitted in the network; the vaccine cell forwarding address table is stored at a vaccine generation node.
Preferably, in the steps (4), (5), (6) and (8), the Match matching function is euclidean distance matching, and the matching is specifically performed by the following formula:
Figure BDA0003084445640000061
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
Preferably, in said steps (4), (6), (7) and (8), the cell self comprises a collection of cells as follows:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
normal, wherein said selfcellIs a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
There is also provided a computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the artificial immunity-based vaccination and vaccine data fusion method described above.
Compared with the prior art, the invention has the beneficial technical effects that:
1. according to the artificial immunity-based vaccination and vaccine data fusion method, after a new invasion behavior is found at any detection node in the network, the data characteristics of the invasion behavior are transmitted to other network nodes through the vaccination method, so that advance defense and large-scale network cooperative defense of other network nodes are realized.
2. The method for the artificial immunity-based vaccination and the data fusion of the vaccine realizes the data fusion of the vaccinated vaccine cells and the autologous vaccine cells, thereby realizing the dynamic update of the autologous vaccine cell bank.
3. In the artificial immunity-based vaccine inoculation and vaccine data fusion method, vaccine cells are fused to form a two-dimensional linked list, so that the defense capacity of the network node is improved.
Drawings
FIG. 1 is a flowchart of a vaccination procedure according to an embodiment of the present invention.
Detailed Description
The following examples are intended to illustrate the present invention in detail and should not be construed as limiting the scope of the present invention in any way.
Example (b): artificial immunity-based vaccination and vaccine data fusion method
On the basis of artificial immunity and biological vaccination, a vaccination method among network nodes is provided to realize rapid cooperative defense of the network nodes on invasion behaviors.
The cooperative defense technology based on vaccination mainly aims at enabling a detection node to carry out immune recognition on an invasion once the invasion is found at the certain invasion detection node, finally forming vaccine cells, enabling a vaccination node in a network to have the vaccine cells aiming at the invasion through the vaccination technology, and enabling the vaccination node to rapidly recognize the invasion at the moment so as to realize cooperative defense of a large-scale network on the invasion.
Referring to fig. 1, the specific steps are as follows:
(1) production of vaccine cells
Data characteristics of memory cells of network nodes: after cloning of the antibody d, the number Nm of antigen matches, the age Pt, and the invasion type Dt of defense, the vaccine cells were encapsulated, and the age Pt of the vaccine cells was set to 0.
The vaccine cell data are expressed as: vd ═ d, Pt, Nm, Dt >.
(2) Vaccine cell encryption
1) Setting vaccine cell data as Vd, obtaining a Hash function value Hf (Vd) of the Vd through a Hash function Hash, and then encrypting the Hf (Vd) through a private key of a vaccine generation network node in an encryption scheme;
2) merging and connecting the Vd and the result of 1), and compressing data; encrypting the compressed data by using a session key used in a conventional encryption scheme;
3) encrypting the session key used in the conventional encryption scheme by the public key of the vaccine generation network node in the encryption scheme, merging and connecting with the result of 2), and then converting into ASCII format of Base64 by ItR64 and naming M;
the specific operation is as follows:
Figure BDA0003084445640000081
(3) encapsulation and transmission of vaccine information
The packet message format for vaccine cells is defined as follows:
Figure BDA0003084445640000082
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells from the vaccination address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table.
(4) Decryption and authentication of vaccine data
After the data packet M is transmitted to the inoculation network node through the step (3), decrypting the data packet M at the inoculation node to obtain transmission data Vd and PrpK (Hf (Vd)); obtaining a Hash function value Hf (Vd) of the vaccine cells and data E decrypted by using a private key at the inoculation node through a Hash function HashPrpK(PrpK (Hf (Vd))) was compared. If the data of the two are consistent, receiving the vaccine cells, otherwise deleting the vaccine cells;
the specific operation is as follows:
Figure BDA0003084445640000083
Figure BDA0003084445640000084
Figure BDA0003084445640000085
(5) vaccination and tolerance of vaccine data
And transmitting the encrypted data to the inoculation node, decrypting and authenticating the encrypted data through a VCSTP protocol, and reading vaccine data. Performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing vaccines for immunological recognition.
The matching function Match is euclidean distance matching and is matched by the following formula:
Figure BDA0003084445640000091
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
The set of cells predominantly comprised by autologous cell self is as follows:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
self.Normalcellis a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
a) V (t) is the pool of vaccine cells inoculated at time t;
b)Vtolerance(t) is the pool of vaccine cells that have undergone a tolerization treatment at time t.
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
Figure BDA0003084445640000092
Figure BDA0003084445640000093
self.Normalcell(t)={y1,y2,…,yn}#(8)
Formula (5) describes the dynamic tolerization process of the vaccine cells at the vaccination node, alpha is the tolerization period of the vaccine cells and alpha > 0. In equation (6), Vdi=<di,0,Nmi,DtiIs the vaccinating cell inoculated from the network at the time t (d.epsilon. {0, 1}kK, Nm > 0, 0 < i ≦ n, n > 0 and is an arbitrary constant). In the formula (7), V' (t) is V (t-1) to selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1。yiNormal is selfcellAnd (t) any autologous cells (i is more than 0 and less than or equal to n, n is more than 0 and is any constant), and as shown in (8), the cells have the common characteristic of not participating in the intrusion defense of the network node. V (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t)。
(6) Data fusion of vaccinated cells
Vaccine cell pool after tolerization Vtolerance(t) of (d). According to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment.
Vcd(t) is the set of vaccine cells that was treated by the process of cell fusion at time t. These vaccine cells satisfy Match (Vd)c.d,VddD) 0, wherein Vdc,Vdd∈Vcd(t)。
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
Figure BDA0003084445640000101
Formula (9) describes vaccination of cellsAnd (3) fusing. V'tolerance(t) is Vtolerance(t1) the pool of vaccine cells with the same defense function. In equation (10), Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells, if Vdq,VdsSatisfies Match (Vd)s.d,VdqD) to 1, indicating that the two vaccine cells have the same defense capacity, Vd was further comparedqNm and VdsNm size and retaining Nm larger vaccine cells. Vcd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)=V′tolerance(t)∪Vcd(t)。
(7) Dynamic evolution of vaccine cell databases
The set of vaccinating cells after the fusion treatment was Vcd(t) of (d). According to VcdD and Nm data bits of vaccine cells in (t) vaccine cell renewal was performed on cells self.vs of the vaccine cell bank of the vaccination node.
self.Vscd(t) is the set of vaccine cells treated by the renewal process at time t.
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=yPt+α}#(11)
Figure BDA0003084445640000102
self.Vs(t)={y1,y2,…,yη}#(13)
Equation (11) describes the update process of the vaccine cell bank. The specific updating process is as follows: vcd(t) removing V'cdAfter (t), the remaining vaccine cells were added to self.vs (t). V'cd(t) is Vcd(t-1) and self.Vs (t-1) with the same defense capacity of the vaccine cell set, as shown in equation (12). If ylAnd Vd satisfies Match (Vd.d, y)lD) 1, vd.nm and y are further comparedlMm, and retain vaccine cells with larger Nm values. As shown in formula (13), ylVs (t), is any autologous vaccine cell, composed of quadruples, i.e. yl=<dl,Ptl,Nml,Dtl> (0 < l.ltoreq.eta. > 0 and is an arbitrary constant), these autovaccine cells have in common the feature of participating in the invasion defense of the node. Vs. selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t)。
(8) Form a two-dimensional chain table of vaccine cells
Vs. the pool of vaccine cells in the vaccine cell bank at time t after the end of the renewal operation was selfcd(t) of (d). Vs according to selfcdAnd (t) performing Vaccine fusion on the Dt data bit and the d data bit of the Vaccine cell to form a Two-Dimensional Linked List (TDLLoV) of the Vaccine cell, and storing the Two-Dimensional Linked List in a Vaccine cell bank.
self.VsdDt(t) is the t-time node vaccine cell bank.
Figure BDA0003084445640000111
Figure BDA0003084445640000112
Equation (14) describes the vaccine cell profile of the vaccine cell bank at time t. When t is larger than or equal to 1, vaccines are fused to form a certain number of vaccine two-dimensional linked lists, and at the moment, the vaccination node has delta independent vaccine cells (which do not participate in the formation of the vaccine two-dimensional linked lists) and rho vaccine two-dimensional linked lists jointly participate in the safety defense of the network node (delta, rho is larger than or equal to 0). Wherein the content of the first and second substances,
Figure BDA0003084445640000113
Figure BDA0003084445640000114
different data bits of vaccine two-dimensional linked list formed at t momentThe value of (4) as shown in (15), wherein Y.d represents the result of linking the antibodies of vaccine cells having a certain relationship to each other; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cells. Y of any one vaccine cell on two-dimensional chain tableρ.dωAfter identifying the invasion behavior, vaccine cells on the two-dimensional linked list of the vaccine participate in the invasion defense behavior together, so as to achieve the rapid defense of the invasion behavior.
(9) Identification of intrusion behavior
Vs. vaccine cell bank selfdDtAnd (t) after the vaccine cells find any invasion behaviors in, carrying out immune recognition on the invasion behaviors in time.
self.Vs(t)=self.VsdDt(t)#(16)
Figure BDA0003084445640000115
Figure BDA0003084445640000116
Equation (16) describes the optimization of the vaccine cell bank at time t. Equations (17) and (18) describe the dynamic evolution of the participation of a single vaccine cell Y and a two-dimensional linked list of vaccine cells Y in the intrusion prevention behavior, respectively. (17) In (3), after identifying the invasion behavior in, if Match (y.d, in) is 1, then y.Pt and y.Nm are automatically added by one, and other values are kept unchanged. If Match (y.d, in) is 0 and y.pt > 0, then automatically decrementing y.pt by one, the other values remaining unchanged; if Match (y.d, in) is 0 and y.pt is 0, then the vaccine cells y are deleted from the vaccine cell bank self.vs (t). (18) In (b), Match (Y.d) is obtained after any vaccine cell on the two-dimensional chain Y recognizes the invasion behavior inξIf in) is 1, then adding one to the Y.Pt and Y.Nm values of the two-dimensional linked list automatically, and keeping other values unchanged; at the same time, y.pt of the vaccine cells identified in on the chainξAnd Y.NmξOne is added automatically, and other values are kept unchanged. If Match (Y.d)ξIn) 0 and y.ptξIf > 0, then Y.PtξAutomatically subtracting one, and keeping other values unchanged; if Match (Y.d)ξIn) 0 and y.ptξWhen the antibody value is 0, the antibody value Y.d of the vaccine cell is deleted from the two-dimensionally linked antibody value Y.dξAnd deleting the antibody type Y.Dt of the vaccine cell from the antibody type Y.Dt of the two-dimensional linked listξThe other values remain unchanged.
In conclusion, the invention is applied to network security defense by simulating the immune mechanism of organisms to viruses and bacteria and the vaccination principle. The method comprises the following implementation steps: the memory cells of the network nodes are packaged into transmissible vaccine cells; the vaccine cells are transmitted to the inoculation node by using a safe transmission protocol; performing immune tolerance on the inoculated vaccine cells at the inoculation node; the vaccine cells from different network nodes are fused with each other according to the matching degree, so that the uniqueness of the vaccine cells is ensured; updating the data of the vaccine cell bank of the inoculation node according to the fusion result; and fusing the vaccine cells according to the antibody and the type value of the vaccine cells to form a two-dimensional linked list of the vaccine cells.
The invention constructs the vaccine cell safe transmission protocol VCSTP, which ensures the safety of the vaccine cell in the transmission process; providing a vaccination method of the vaccine cells, and describing a dynamic evolution process of the vaccinated cells; the fusion method between vaccine cells is provided, and the dynamic update process of a vaccine cell bank is described; and a process for forming a two-dimensional linked list of vaccine cells is provided, and the defense capability of the network node is improved. And the rapid cooperative defense of different network nodes on the intrusion attack behavior in the network can be realized.
The vaccination and vaccine data fusion method based on artificial immunity is applied to the cooperative defense of a large-scale network against invasion attacks, after any detection node in the network immunologically recognizes a new invasion behavior, relevant data such as an antibody of the invasion behavior and the like are packaged into vaccine cells, and the vaccine cells are transmitted to other network nodes through a safe transmission protocol, so that the cooperative defense of the large-scale network against the invasion behavior is realized; the inoculated vaccine cells and the autologous vaccine cells realize data fusion, and dynamic update of an autologous vaccine cell bank is realized; vaccine cells are fused to form a two-dimensional linked list, so that the defense capacity of the network node is improved.
While the present invention has been described in detail with reference to the drawings and the embodiments, those skilled in the art will understand that various specific parameters in the above embodiments can be changed without departing from the spirit of the present invention, and a plurality of specific embodiments are formed, which are common variation ranges of the present invention, and will not be described in detail herein.

Claims (6)

1. A vaccination and vaccine data fusion method based on artificial immunity is characterized by comprising the following steps:
(1) collecting vaccine cell data;
the vaccine cell data are expressed as:
Vd=<d,Pt,Nm,Dt>;
wherein d is antibody data of the vaccine cells; the Pt is the age of the vaccine cells, and the initial value Pt is 0; the Nm is the number of antigens recognized by the antibody d; the Dt is an invasion type of vaccine cell defense;
(2) securely encrypting and authenticating the vaccine cells;
designing VCSTP, and ensuring the safety of the vaccine data through an encryption algorithm and an authentication mechanism;
the VCSTP operates as follows:
Figure FDA0003084445630000011
Figure FDA0003084445630000012
Figure FDA0003084445630000013
Figure FDA0003084445630000014
wherein Vd is vaccine data, M is encryption data, GsK is a session key used in a conventional encryption scheme, PrpK is a private key of user a in a public key encryption scheme, PupK is a public key of user a in a public key encryption scheme, Hf is a hash function, and a hash function is applied to the public key of user a in a public key encryption scheme
Figure FDA0003084445630000015
For concatenation, Zi is compressed using ZIP algorithm, R64 is converted to ASCII format from Base64, Zi-1 is decompressed, ItR64-1For ItR64 reverse conversion, the
Figure FDA0003084445630000016
For comparison, the EPrpKFor decryption using the private key, EPupKFor decryption using a public key, said EGsKFor decryption using the session key;
(3) packaging and transmitting the vaccine data;
the data packet message format of the vaccine cells is as follows:
Figure FDA0003084445630000017
wherein, the total length is the total length of the transmission data packet and is used for extracting the vaccine cells by the inoculation address; the check sum is used for accurately acquiring M by the inoculation node, so that the vaccine cell data is free from errors; the time to live TTL is determined according to the distance in the vaccine cell forwarding address table; the source address is the production address of the vaccine cell; the inoculation network number is the network number of the inoculation address of the vaccine cell and is determined according to the inoculation network number of the vaccine cell forwarding address table;
(4) vaccination and tolerance of the vaccine data;
the vaccine data are transmitted to an inoculation node, decrypted and authenticated through VCSTP, and the vaccine data are read;performing tolerance treatment on the vaccine cells by using a Match matching function, and deleting self cells selfcellProducing an immunologically recognized vaccine;
the specific process is as follows:
Vtolerance(t)={Vd|Vd∈(V(t)-V′(t)),Vd.Pt=Vd.Pt+α}#(5)
Figure FDA0003084445630000021
Figure FDA0003084445630000022
self.Normalcell(t)={y1,y2,…,yn}#(8)
wherein V (t) is a set of vaccine cells inoculated at time t; vtolerance(t) is a vaccine cell set subjected to tolerance treatment at the time t; alpha is the tolerance period of the vaccine cells and alpha is more than 0; vdi=<di,0,Nmi,Dti>Vaccinal cells vaccinated from the network for the time t node; v' (t) is V (t-1) vs selfcell(t-1) the cells have an immunorecognition ability, and the vaccine cells in V' (t) satisfy Match (Vd.d, y)i)=1;yiIs selfcell(t) any autologous cell (i is more than 0 and less than or equal to n, n is more than 0 and is any constant); v (t), Vtolerance(t) and V' (t) satisfy the relationship: v (t) ═ Vtolerance(t)∪V′(t);
(5) Data fusion between the vaccinated cells;
according to Vtolerance(t) d data bits and Nm data bits of vaccine cells vs Vtolerance(t) performing vaccine data fusion treatment;
the specific process is as follows:
Vcd(t)={Vd|Vd∈(Vtolerance(t)-V′tolerance(t)),Vd.Pt=Vd.Pt+α}#(9)
Figure FDA0003084445630000023
wherein, the Vcd(t) is the set of vaccine cells treated by the process of cell fusion of vaccination at time t; vcd(t) the vaccine cells meet Match (Vd)c.d,VddD) 0, wherein Vdc,Vdd∈Vcd(t); v'tolerance(t) is Vtolerance(t-1) the pool of vaccine cells having the same defense function; said Vdq,VdsRepresents Vtolerance(t-1) any two of the vaccine cells; the V iscd(t)、Vtolerance(t) and V'tolerance(t) satisfies the relationship: vtolerance(t)=V′tolerance(t)∪Vcd(t);
(6) Dynamic evolution of the vaccine cell database;
according to Vcd(t) cell renewal of vaccine cells on cells self.vs of the vaccine cell bank of the vaccination node at d and Nm data bits of vaccine cells;
the process is as follows:
self.Vscd(t)={y|y∈(Vcd(t)-V′cd(t)+self.Vs(t)),y.Pt=y.Pt+α}#(11)
Figure FDA0003084445630000031
self.Vs(t)={y1,y2,…,yη}#(13)
wherein, said self.Vscd(t) is the pool of vaccine cells treated by the renewal process at time t; v'cd(t) is Vcd(t-1) a pool of vaccine cells with the same capacity of defense as in self.vs (t-1); said ylVs (t), is any autologous vaccine cell; vs. said selfcd(t)、self.Vs(t)、Vcd(t) and V'cd(t) satisfies the relationship: vs. selfcd(t)=self.Vs(t)∪Vcd(t)-V′cd(t);
(7) Forming a two-dimensional chain table of vaccine cells;
vs according to selfcd(t) performing vaccine fusion on the Dt data bit and the d data bit of the vaccine cell in the step (t) to form a vaccine cell two-dimensional linked list TDLLoV, and storing the vaccine cell two-dimensional linked list TDLLoV in a vaccine cell database;
the process is as follows:
Figure FDA0003084445630000032
Figure FDA0003084445630000033
wherein, said self.VsdDt(t) is the t-time node vaccine cell bank; δ is the number of independent vaccine cells; rho is the number of the two-dimensional linked lists of the vaccines; y.d is the result of linking the antibodies of the vaccine cells having a relationship to each other; both y.pt and y.nm are initialized to 0; dt is the result of linking the type of vaccine cells; omega is the number of vaccine cells on Y;
(8) identifying an intrusion behavior;
vs. the vaccine cell bankdDt(t) after the vaccine cells find any invasion behaviors, carrying out immune recognition on the invasion behaviors in time;
the process is as follows:
self.Vs(t)=self.VsdDt(t)#(16)
Figure FDA0003084445630000041
Figure FDA0003084445630000042
wherein y is a single epidemic involved in intrusion preventionSeeding cells; y is a two-dimensional chain table of vaccine cells participating in invasion defense; in is an invasion behavior; ptξAge of vaccine cell xi on Y; nmξThe number of antigens that are vaccine cell xi on Y; dξAntibody data for vaccine cell xi on Y; dtξIs the invasion type of vaccine cell xi defense on Y.
2. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (1), the invasion type of the vaccine cells is at least one of DoS, R2L, U2R and Probe.
3. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (3), the data recorded by the vaccine cell forwarding address table is:
inoculation network number Distance between two adjacent plates Next network number
The vaccination network number is a vaccination address of the vaccine cell, the distance is the network hop number required to pass between the vaccine production node and the vaccination node, and the next network number is the next path of the vaccine cell when the vaccine cell is transmitted in the network; the vaccine cell forwarding address table is stored at a vaccine generation node.
4. The artificial immunity-based vaccination and vaccine data fusion method according to claim 1, wherein in the step (4), the Match matching function is Euclidean distance matching, and is specifically matched according to the following formula:
Figure FDA0003084445630000043
wherein A and B are two different vaccine cells, aiAnd biRepresenting different data bits of a and B, respectively.
5. The artificial immunity-based vaccination and vaccination data fusion method according to claim 1, wherein in step (4), the cells self comprise the following cell aggregates:
self=<Normalcell,Vs>,(self∈{0,1}l,l>0)
normal, wherein said selfcellIs a collection of cells in the node that are not involved in intrusion defense; vs is the pool of vaccine cells in the node.
6. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the artificial immunity-based vaccination and vaccine data fusion method of any of claims 1-5.
CN202110576244.4A 2021-05-26 2021-05-26 Artificial immunity-based vaccination and vaccine data fusion method Active CN113222048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110576244.4A CN113222048B (en) 2021-05-26 2021-05-26 Artificial immunity-based vaccination and vaccine data fusion method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110576244.4A CN113222048B (en) 2021-05-26 2021-05-26 Artificial immunity-based vaccination and vaccine data fusion method

Publications (2)

Publication Number Publication Date
CN113222048A true CN113222048A (en) 2021-08-06
CN113222048B CN113222048B (en) 2023-02-17

Family

ID=77098524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110576244.4A Active CN113222048B (en) 2021-05-26 2021-05-26 Artificial immunity-based vaccination and vaccine data fusion method

Country Status (1)

Country Link
CN (1) CN113222048B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030084329A1 (en) * 2001-10-31 2003-05-01 Tarquini Richard Paul Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits
CN101299691A (en) * 2008-06-13 2008-11-05 南京邮电大学 Method for detecting dynamic gridding instruction based on artificial immunity
US20090125755A1 (en) * 2005-07-14 2009-05-14 Gryphonet Ltd. System and method for detection and recovery of malfunction in mobile devices
US20110262468A1 (en) * 2010-04-23 2011-10-27 Nodality, Inc. Method for Monitoring Vaccine Response Using Single Cell Network Profiling
CN102420824A (en) * 2011-11-30 2012-04-18 中国科学院微电子研究所 Restructurable Internet of things node intrusion detection method
CN105933301A (en) * 2016-04-13 2016-09-07 重庆邮电大学 SDN based concentrated network worm prevention-control method and device
CN107046549A (en) * 2017-05-31 2017-08-15 郑州轻工业学院 Based on immune Internet of Things Novel Distributed Intrusion Detection Method and system
CN110188547A (en) * 2019-05-14 2019-08-30 北京可信华泰信息技术有限公司 A kind of credible encryption system and method
CN111259416A (en) * 2020-01-13 2020-06-09 湖北大学 Multi-algorithm security encryption authentication system and method based on FPGA

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030084329A1 (en) * 2001-10-31 2003-05-01 Tarquini Richard Paul Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits
US20090125755A1 (en) * 2005-07-14 2009-05-14 Gryphonet Ltd. System and method for detection and recovery of malfunction in mobile devices
CN101299691A (en) * 2008-06-13 2008-11-05 南京邮电大学 Method for detecting dynamic gridding instruction based on artificial immunity
US20110262468A1 (en) * 2010-04-23 2011-10-27 Nodality, Inc. Method for Monitoring Vaccine Response Using Single Cell Network Profiling
CN102420824A (en) * 2011-11-30 2012-04-18 中国科学院微电子研究所 Restructurable Internet of things node intrusion detection method
CN105933301A (en) * 2016-04-13 2016-09-07 重庆邮电大学 SDN based concentrated network worm prevention-control method and device
CN107046549A (en) * 2017-05-31 2017-08-15 郑州轻工业学院 Based on immune Internet of Things Novel Distributed Intrusion Detection Method and system
CN110188547A (en) * 2019-05-14 2019-08-30 北京可信华泰信息技术有限公司 A kind of credible encryption system and method
CN111259416A (en) * 2020-01-13 2020-06-09 湖北大学 Multi-algorithm security encryption authentication system and method based on FPGA

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
YAPING J.等: "Intrusion Prevention System Base on Immune Vaccination", 《2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION》 *
于全 等: "类生物免疫机制的网络安全架构", 《网络空间安全》 *
蒋亚平 等: "基于疫苗算子的入侵检测模型", 《计算机工程与设计》 *
郑凯元等: "基于多智能体的自动免疫接种模型", 《计算机工程与应用》 *

Also Published As

Publication number Publication date
CN113222048B (en) 2023-02-17

Similar Documents

Publication Publication Date Title
CN104408177B (en) Cipher text retrieval method based on cloud document system
WO2021208690A1 (en) Method and apparatus for data encryption and decryption, device, and storage medium
CN110719165B (en) Block chain distributed dynamic network key generation and encryption method
CN112532613B (en) Hidden communication method based on block chain address
CN109327308B (en) Quantum key distribution method and system with bidirectional identity authentication function
CN111209591B (en) Storage structure sorted according to time and quick query method
CN111709058B (en) Data integrity checking method based on identity and ring signature
CN105141602A (en) File ownership proof method based on convergence encryption
CN110138543B (en) Blind signcryption method under lattice public key cryptosystem
Safavi-Naini et al. New results on multi-receiver authentication codes
CN101980558A (en) Method for encryption authentication on Ad hoc network transmission layer protocol
CN108809637A (en) The car-ground communication Non-Access Stratum authentication key agreement methods of LTE-R based on mixed cipher
CN106506453A (en) Electric power big data transmission method and system based on Rapid matching and integrity detection
CN114338038B (en) Storage system for secret inquiry of block chain data and careless transmission method
CN113222048B (en) Artificial immunity-based vaccination and vaccine data fusion method
CN107425955A (en) A kind of identity base graded encryption method on lattice that can efficiently fix the derivation of dimension trapdoor
CN114244498A (en) Dynamic searchable public key encryption method with forward security
WO2019196237A1 (en) Resident household registration information management method, server and computer readable storage medium
CN115296857A (en) Network threat sensing and immunization method based on topological structure and deep learning-AIS
CN113204788B (en) Fine granularity attribute matching privacy protection method
US7831998B2 (en) Changing states of communication links in computer networks in an authenticated manner
Shanthini et al. Multimodal biometric-based secured authentication system using steganography
CN106357410A (en) Method for building subliminal channel on lattice signature without one-way trap door
CN103856939B (en) Two-stage identity authentication method based on random number
Tea Unmasking Concealed 5G Privacy Identity with Machine Learning and GPU in 12 mins

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant