期刊文献+

基于攻防信号博弈模型的防御策略选取方法 被引量:26

Defense policies selection method based on attack-defense signaling game model
下载PDF
导出
摘要 当前基于博弈理论的防御策略选取方法大多采用完全信息或静态博弈模型,为更加符合网络攻防实际,从动态对抗和有限信息的视角对攻防行为进行研究。构建攻防信号博弈模型,对策略量化计算方法进行改进,并提出精炼贝叶斯均衡求解算法。在博弈均衡分析的基础上,设计了最优防御策略选取算法。通过实验验证了模型和算法的有效性,并在分析实验数据的基础上总结了攻防信号博弈的一般性规律,能够指导不同类型防御者的决策。 Currently defense policies selection based on game theory mostly applied either the complete information game model or the static game model. In order to be more in line with the reality of network attack and defense, attack-defense behavior was studied by dynamic rivalry and incomplete information. The attack-defense signaling game mode was built, the method to quantify policies was improved and an algorithm to obtain the perfect Bayesian equilibrium was proposed. On the basis of analyzing equilibrium, the algorithm for selecting the optimal defense policy was proposed. The simulation experiment demonstrates that the model and algorithms are feasible and effective. By the experimental data, general rules on signaling attack-defense game are summarized, which can guide defenders of different types to make decisions.
出处 《通信学报》 EI CSCD 北大核心 2016年第5期51-61,共11页 Journal on Communications
基金 国家自然科学基金资助项目(No.61303074 No.61309013) 国家重点基础研究发展计划("973"计划)基金资助项目(No.2012CB315900) 河南省科技计划基金资助项目(No.12210231003 No.13210231002)~~
关键词 动态博弈 不完全信息 攻防信号博弈 精炼贝叶斯均衡 均衡分析 策略选取 dynamic game incomplete information attack-defense signaling game perfect Bayesian equilibrium equilibrium analysis policy selection
  • 相关文献

参考文献7

二级参考文献113

  • 1冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 2张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 3王龙,伏锋,陈小杰,王靖,李卓政,谢广明,楚天广.复杂网络上的演化博弈[J].智能系统学报,2007,2(2):1-10. 被引量:33
  • 4林海,吴晨旭.基于遗传算法的重复囚徒困境博弈策略在复杂网络中的演化[J].物理学报,2007,56(8):4313-4318. 被引量:11
  • 5方滨兴.解读信息安全创新突破点[OL].[2008-03-21].http://www.cert.org.cn/articles/news/common/2007051823317.shtml,2008.
  • 6Nash J.Equilibrium points in n-person games[J].Proc of the National Academy of Sciences of the United States of America,1950,36(1):48-49.
  • 7Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22.
  • 8Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.
  • 9Syverson P F.A different look at secure distributed computation[C]//Proc of the 1997 IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society,1997:109-115.
  • 10Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,1999.

共引文献207

同被引文献112

引证文献26

二级引证文献124

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部