Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 11-19.doi: 10.11959/j.issn.2096-109x.2021002

• Topic Ⅰ: Security Architecture Applications of Novel Network • Previous Articles     Next Articles

Research on bionic mechanism based endogenous security defense system

Aiqun HU1,1, Lanting FANG1,1, Tao LI1,1   

  1. 1 School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
    2 Purple Mountain Laboratories, Nanjing 211100, China
  • Revised:2020-07-03 Online:2021-02-15 Published:2021-02-01
  • Supported by:
    The National Natural Science Foundation of China(6162520);Youth Scholar Program of SEU

Abstract:

Shell-based security defense technologies such as firewall, intrusion detection and anti-virus cannot be updated in a timely fashion upon identification of attacks.The security defense mechanism is not associated with the security status of network devices, resulting in low security performance.To solve the above problems, an endogenous security defense system based on the bionic security mechanism was proposed.Firstly, imitating the security defense mechanism of the organism, the endogenous security system integrated the security component with each other at the construction process.Secondly, the endogenous security associates all security components through network interconnection, and proposed a defense in depth and comprehensive approach to increase the security of a system.Finally, through the self-learning, endogenous security's ability of threat detection was continuous enhanced.By integrating the security system and information system, an endogenous security defense system was constructed.The endogenous security defense system can handle the challenges such as low defensive efficiency ratio, high-speed data processing, and unknown threats detection.The endogenous security system is an efficient security defense system of “innate growth and independent growth”.It meets the development needs of information systems with “high availability, security and high efficiency”.

Key words: endogenous security, defense mechanism, bionic security, independent learning

CLC Number: 

No Suggested Reading articles found!