Research on Application of Artificial Immune System in 3G Mobile Network Security
Currently, 3G communication technology develops very rapidly. Ensuring the security of 3G communication, monitoring network attack and avoiding risk become a hotspot concerned by the academic circle. This paper puts forward an intrusion detection algorith
- PDF / 175,241 Bytes
- 6 Pages / 439.37 x 666.142 pts Page_size
- 96 Downloads / 181 Views
Research on Application of Artificial Immune System in 3G Mobile Network Security Dongming Zhao
Abstract Currently, 3G communication technology develops very rapidly. Ensuring the security of 3G communication, monitoring network attack and avoiding risk become a hotspot concerned by the academic circle. This paper puts forward an intrusion detection algorithm based on artificial immunity, which is an important development direction of the improvement of security and reliability of 3G mobile network and detects network attack and real-time risk of mobile communication network with a good monitoring effect and high accuracy. Compared to RBF method, it has more accurate risk prediction of communication network and such characteristics as distributivity, diversity, auto-answer, self-maintenance, high accuracy and short time. Keywords Artificial immunity
3G Network security
395.1 Introduction With the extensive use of mobile communication technology in the daily life and constant expansion of its related network, how to ensure the information security of wireless network effectively while improving communication quality and providing diversified and personalized services and various wireless data services has become a key problem restricting the development of mobile communication technology [1]. Compared to the first and second generations of mobile communication network, 3G mobile communication has made great progress in security [2]. However, due to 1P structural feature of its own network, various security
D. Zhao (&) Langfang Teachers College, Langfang, 065000 Hebei, China e-mail: [email protected]
S. Li et al. (eds.), Frontier and Future Development of Information Technology 3089 in Medicine and Education, Lecture Notes in Electrical Engineering 269, DOI: 10.1007/978-94-007-7618-0_395, Springer Science+Business Media Dordrecht 2014
3090
D. Zhao
problems based on IP network will pose a threat to 3G network to different extents [3]. Security risk caused by network openness, if not avoided effectively, will impose a great impact on the normal operation of 3G network based on IP network. There is a great similarity between biology immune system and computer security system [4]. The former protects organism from being damaged by pathogenic organism, while the latter protects the computer system from hostile attack by hacker [5]. This paper puts forward a real-time monitoring algorithm with the method of artificial immunity based on immunology principle of organism, which can monitor network attack and communication risk in 3G mobile communication network in real time and ensure the security of communication system.
395.2 Artificial Immune Technology Artificial immune system (AIS) is an umbrella name of various intelligent systems developed by researching, imitating and using the principle and mechanism of biology immune system. Intrusion detection and proactive protection based on immunology are research hotspot in the security field such as computer, communication and data processing, as well a
Data Loading...