Skip to main content

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11064))

Included in the following conference series:

Abstract

With a rapid accumulation of cyberspace digital virtual assets (CDVA), the serious security risks of CDVA appear since the lack of security protection methods for CDVA application systems. The present CDVA security systems mainly adopt the general network threat detection methods, do not deal with the specifics of CDVA, thus, they are not suitable for CDVA security threat detection. This paper presents an immune-based security threat detection system (IBSTDS) for CDVA. The system collects the data flow of fundamental infrastructure from Internet, extracts and formalizes the features to form antigens. The antigens are sequentially sent to the memory detectors and mature detectors for known and unknown threat detection. The immune detectors are optimized by detector dynamic evolution and immune feedback mechanism. The experiment proves that the system has the ability of threat-recognition and self-learning. Compared with the current CDVA security systems, IBSTDS supports adaptability, self-organization, robustness and self-learning, and provides a good solution to detect the security threat to digital virtual assets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rouse, M.: Definition of virtual asset (2018). http://searchfinancialsecurity.techtarget.com/definition/virtual-asset

  2. Goodman, J., Verbrugge, C.: A peer auditing scheme for cheat elimination in MMOGs. In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, pp. 9–14 (2008)

    Google Scholar 

  3. Denault, A., Kienzle, J.: Journey: a massively multiplayer online game middleware. IEEE Softw. 28(5), 38–44 (2011)

    Article  Google Scholar 

  4. Yahyavi, A., Kemme, B.: Peer-to-peer architectures for massively multiplayer online games: a survey. ACM Comput. Surv. (CSUR) 46(1), 1–51 (2013)

    Article  Google Scholar 

  5. Yahyavi, A., Huguenin, K., Gascon-samson, J., Kienzle, J., Kemme, B.: Watchmen: scalable cheat-resistant support for distributed multi-player online games. In: IEEE International Conference on Distributed Computing Systems, pp. 134–144 (2013)

    Google Scholar 

  6. Maguluri, N.S.N.: Multi-class classification of textual data: detection and mitigation of cheating in massively multiplayer online role playing games (2017)

    Google Scholar 

  7. Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 475–490 (2014)

    Google Scholar 

  8. Dagher, G.G., Bünz, B., Bonneau, J., Clark, J., Boneh, D.: Provisions: privacy-preserving proofs of solvency for bitcoin exchanges. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 720–731 (2015)

    Google Scholar 

  9. Peck, M.: A blockchain currency that beat s bitcoin on privacy [news]. IEEE Spectr. 53(12), 11–13 (2016)

    Article  Google Scholar 

  10. Lazarovich, A.: Invisible Ink: blockchain for data privacy. Ph.d. thesis, Massachusetts Institute of Technology (2015)

    Google Scholar 

  11. Zyskind, G., Nathan, O., et al.: Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 180–184 (2015)

    Google Scholar 

  12. Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., Akutsu, A.: The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud), pp. 187–190 (2015)

    Google Scholar 

  13. Herbert, J., Litchfield, A.: A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), vol. 27, p. 30 (2015)

    Google Scholar 

  14. Denemark, T.D., Boroumand, M., Fridrich, J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)

    Article  Google Scholar 

  15. Akinwande, V.: Security assessment of blockchain-as-a-service (BaaS) platforms (2017)

    Google Scholar 

  16. Matters, M.: Bitcoins, block chains, and mining pools (2014)

    Google Scholar 

  17. Massacci, F., Ngo, C.-N., Williams, J.M.: Decentralized transaction clearing beyond blockchains (2016)

    Google Scholar 

  18. Extance, A.: The future of cryptocurrencies: bitcoin and beyond. Nat. News 526(7571), 21 (2015)

    Article  Google Scholar 

  19. Li, T.: Dynamic detection for computer virus based on immune system. Sci. China Ser. F: Inf. Sci. 51(10), 1475–1486 (2008)

    MathSciNet  MATH  Google Scholar 

  20. Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolut. Comput. 13(2), 179–212 (2005)

    Article  Google Scholar 

  21. Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection-a review. Nat. Comput. 6(4), 413–466 (2007)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

This work is supported by National Key Research and Development Program of China (Grant No. 2016YFB0800604 and No. 2016YFB0800605), Natural Science Foundation of China (Grant No. U1736212 and No. 61572334), and Sichuan Province Key Research and Development Project of China (Grant No. 2018GZ0183).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, P., Li, T., Liu, X., Zhao, H., Yang, J., Zhu, F. (2018). An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00009-7_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00008-0

  • Online ISBN: 978-3-030-00009-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics