Biomimetic security model based on immune system control mechanism
The limitations of traditional perimeter-based defense mechanisms have gradually become apparent as information system architectures have become increasingly complex, with defense concentrated on the external boundary becoming difficult to deal with threats that penetrate into the network interior,...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2025-04-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025017 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The limitations of traditional perimeter-based defense mechanisms have gradually become apparent as information system architectures have become increasingly complex, with defense concentrated on the external boundary becoming difficult to deal with threats that penetrate into the network interior, new and unknown advanced threats, the breach of the boundary being prone to a single point of failure, and a lack of comprehensive and all-round security guarantees. A biomimetic security model based on the control mechanisms of the immune system was proposed to address these problems. The model was designed to achieve information learning by mimicking the functions of dendritic immune cells distributed throughout the human body to capture pathogens, the blood vessels that carry information transmission and intercommunication, and the lymphatic system that comprehensively analyzes and processes information and makes decisions. A system with autonomous defense functions was thus built. Task-oriented, the system was divided into three components: task component, forwarding component, and distributed control component, with all parts being highly interconnected and integrated. The task component was designed to perform basic tasks and extract security information during execution. The security information was initially processed and judged by the forwarding component and then forwarded to the control component. The control component generated decisions based on the security decision tree for calibration, thereby achieving active defense against abnormal situations. The experimental results showed that the success rate of the proposed model in defending against system anomaly attacks reached 98.9%. Furthermore, the model fundamentally realized the full-chain mechanism of the biomimetic immune model, from capture, presentation, and transmission to analysis, decision-making, and effectuation. |
|---|---|
| ISSN: | 2096-109X |