Abstract
With a rapid accumulation of cyberspace digital virtual assets (CDVA), the serious security risks of CDVA appear since the lack of security protection methods for CDVA application systems. The present CDVA security systems mainly adopt the general network threat detection methods, do not deal with the specifics of CDVA, thus, they are not suitable for CDVA security threat detection. This paper presents an immune-based security threat detection system (IBSTDS) for CDVA. The system collects the data flow of fundamental infrastructure from Internet, extracts and formalizes the features to form antigens. The antigens are sequentially sent to the memory detectors and mature detectors for known and unknown threat detection. The immune detectors are optimized by detector dynamic evolution and immune feedback mechanism. The experiment proves that the system has the ability of threat-recognition and self-learning. Compared with the current CDVA security systems, IBSTDS supports adaptability, self-organization, robustness and self-learning, and provides a good solution to detect the security threat to digital virtual assets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rouse, M.: Definition of virtual asset (2018). http://searchfinancialsecurity.techtarget.com/definition/virtual-asset
Goodman, J., Verbrugge, C.: A peer auditing scheme for cheat elimination in MMOGs. In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, pp. 9–14 (2008)
Denault, A., Kienzle, J.: Journey: a massively multiplayer online game middleware. IEEE Softw. 28(5), 38–44 (2011)
Yahyavi, A., Kemme, B.: Peer-to-peer architectures for massively multiplayer online games: a survey. ACM Comput. Surv. (CSUR) 46(1), 1–51 (2013)
Yahyavi, A., Huguenin, K., Gascon-samson, J., Kienzle, J., Kemme, B.: Watchmen: scalable cheat-resistant support for distributed multi-player online games. In: IEEE International Conference on Distributed Computing Systems, pp. 134–144 (2013)
Maguluri, N.S.N.: Multi-class classification of textual data: detection and mitigation of cheating in massively multiplayer online role playing games (2017)
Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 475–490 (2014)
Dagher, G.G., Bünz, B., Bonneau, J., Clark, J., Boneh, D.: Provisions: privacy-preserving proofs of solvency for bitcoin exchanges. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 720–731 (2015)
Peck, M.: A blockchain currency that beat s bitcoin on privacy [news]. IEEE Spectr. 53(12), 11–13 (2016)
Lazarovich, A.: Invisible Ink: blockchain for data privacy. Ph.d. thesis, Massachusetts Institute of Technology (2015)
Zyskind, G., Nathan, O., et al.: Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 180–184 (2015)
Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., Akutsu, A.: The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud), pp. 187–190 (2015)
Herbert, J., Litchfield, A.: A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), vol. 27, p. 30 (2015)
Denemark, T.D., Boroumand, M., Fridrich, J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)
Akinwande, V.: Security assessment of blockchain-as-a-service (BaaS) platforms (2017)
Matters, M.: Bitcoins, block chains, and mining pools (2014)
Massacci, F., Ngo, C.-N., Williams, J.M.: Decentralized transaction clearing beyond blockchains (2016)
Extance, A.: The future of cryptocurrencies: bitcoin and beyond. Nat. News 526(7571), 21 (2015)
Li, T.: Dynamic detection for computer virus based on immune system. Sci. China Ser. F: Inf. Sci. 51(10), 1475–1486 (2008)
Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolut. Comput. 13(2), 179–212 (2005)
Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection-a review. Nat. Comput. 6(4), 413–466 (2007)
Acknowledgment
This work is supported by National Key Research and Development Program of China (Grant No. 2016YFB0800604 and No. 2016YFB0800605), Natural Science Foundation of China (Grant No. U1736212 and No. 61572334), and Sichuan Province Key Research and Development Project of China (Grant No. 2018GZ0183).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Lin, P., Li, T., Liu, X., Zhao, H., Yang, J., Zhu, F. (2018). An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_54
Download citation
DOI: https://doi.org/10.1007/978-3-030-00009-7_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00008-0
Online ISBN: 978-3-030-00009-7
eBook Packages: Computer ScienceComputer Science (R0)