期刊文献+

基于Markov时间博弈的移动目标防御最优策略选取方法 被引量:10

Optimal strategy selection approach of moving target defense based on Markov time game
下载PDF
导出
摘要 针对现有博弈模型难以有效建模网络攻防对抗动态连续特性的问题,提出了一种基于Markov时间博弈的移动目标防御最优策略选取方法。在分析移动目标攻防对抗过程的基础上,构建了移动目标攻防策略集合,利用时间博弈刻画了单阶段移动目标防御过程的动态性,利用Markov决策过程描述了多阶段移动目标防御状态转化的随机性。同时,将攻防双方对资源脆弱性抽象为对攻击面控制权的交替,从而有效保证了博弈模型的通用性。在此基础上,分析并证明了均衡的存在性,设计了最优策略选取算法。最后,通过应用实例验证了所提模型的实用性和算法的有效性。 For the problem that the existed game model was challenging to model the dynamic continuous characteristics of network attack and defense confrontation effectively, a method based on Markov time game was proposed to select the optimal strategy for moving target defense. Based on the analysis of the attack and defense confrontation process of moving targets, the set of moving target attack and defense strategies was constructed. The dynamics of the single-stage moving target defense process was described by time game. The randomness of multi-stage moving target defense state transformation was described by Markov decision process. At the same time, by abstracting the use of resource vulnerability by attack-defense participants as the alternation of the control of the attack surface, the versatility of the game model was effectively guaranteed. On this basis, the existence of equilibrium was analyzed and proved, and the optimal strategy selection algorithm was designed. Finally, the practicality of the constructed model and the effectiveness of the algorithm are verified by an application example.
作者 谭晶磊 张恒巍 张红旗 金辉 雷程 TAN Jinglei;ZHANG Hengwei;ZHANG Hongqi;JIN Hui;LEI Cheng(Department of Three,Information Engineering University,Zhengzhou 450001,China;Henan Key Laboratory of Information Security,Zhengzhou 450001,China)
出处 《通信学报》 EI CSCD 北大核心 2020年第1期42-52,共11页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2016YFF0204002,No.2016YFF0204003) 国家自然科学基金资助项目(No.61902427)~~
关键词 时间博弈 移动目标攻击 移动目标防御 最优策略选取 Markov决策 time game moving target attack moving target defense optimal strategy selection Markov decision
  • 相关文献

参考文献6

二级参考文献48

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5Nicol D M, Liljenstam M. Models and analysis of active worm defense//Lecture Notes in Computer Science, 2005, 3685:38-53
  • 6Nash John. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences, 1950, (36) : 48-49
  • 7Hamilton S N, Miller W L, Ott A, Saydjari O S. The role of game theory in information warfare//Proceedings of the 4th Information Survivability Workshop. Vancouver, Canada, 2002 : 45-46
  • 8Schneier B. Attack trees. Dr. Dobb' s Journal, 1999, 24 (12) : 21-29
  • 9Moore Andrew P, Ellison Robert J, Linger Richard C. Attack modeling for information security and survivability. Technical Note: CMU/SEI-2001-TN-001, 2001
  • 10Dacier M. Towards quantitative evaluation of computer security. Institut National Polytechnique de Toulouse, 1994

共引文献225

同被引文献96

引证文献10

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部