期刊文献+

基于博弈论的网络攻防对抗模型及应用研究 被引量:6

Research on the Game Theory based Network Attack-Defense and its Application
下载PDF
导出
摘要 网络攻防模型是研究网络攻防仿真建模的一项重要内容。目前使用较多攻击树等模型存在不能描述攻防双方的对抗、互动等特性的缺陷。文章研究了基于博弈论的攻防对抗模型,定义了攻防双方博弈的基本要素及相应的纳什均衡,剖析了常见的字典攻击,给出了博弈双方的攻防策略、攻防效用等的具体描述;最后结合Gambit工具进一步细化了字典攻击中的博弈模型,并给出了其纳什均衡。 The network attack-defense model is important composition of network security. The current-used models usually cannot describe the characters of the interaction and confrontation of the both attack-defense sides, which is the chief drawback. The paper proposes the game theory based attack-defense models, defines the elements and the Nash equilibrium of both side of the game. Using the dictionary-attack as an example, this paper characterizes the confrontation policy and its effective, and the Nash equilibrium as the result of Gambit.
出处 《信息网络安全》 2013年第1期52-54,共3页 Netinfo Security
关键词 网络对抗模型 博弈论 字典攻击 纳什均衡 network attack-defense game theory dictionary-attack Nash equilibrium
  • 相关文献

参考文献8

  • 1Osborne M J;Rubinstein A;魏玉根.博弈论教材[M]北京:中国社会科学出版社,2000.
  • 2B Schneier. Attack Trees:Modeling Security Threads[J].Dr Dobb'sJournal,1999.
  • 3林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 4Lye K,WingJ M. Game Strategies in network security[C].Proceedings of the IEEE Computer Security Foundations Workshop[J].Copenhangen,2002,(1-2):71-86.
  • 5石盼,连一峰.基于战略博弈的DDoS攻防绩效评估方法[J].计算机工程,2009,35(3):195-198. 被引量:2
  • 6Liu Peng,Zang Wangyu,Yu Meng. Incentive-based modelingand inference of attacker intent,objectives,and strategies[J].ACM Transactions on Information and System Security,2005,(01):1-41.
  • 7Xu J,Lee W. Sustaining availability of web services under distributed denial of service attack[J].IEEE Transaction on Computer,2003,(04):195-208.
  • 8Pasmuusen E;王晖.博弈与信息:博弈论概述(第二版)[M]北京:北京大学出版社,2003.

二级参考文献15

  • 1林闯,李雅娟,刘雪宁.非马尔可夫随机Petri网的分析方法及应用[J].系统仿真学报,2003,15(z1):71-75. 被引量:3
  • 2Molsa J. A Taxonomy of Criteria for Evaluating Defense Mechanisms Against Flooding DoS Attacks[C]//Proc. of the 1st European Conference on Computer Network Defense. Pontypridd, Wales, UK: [s. n.], 2005: 13.
  • 3Mulligan J A. A Comparison Framework for Proactive Internet Denial of Service Solutions[EB/OL]. (2005-03-12). http://theory. csail.mit.edu/-mulligan/ProFramework.pdf.
  • 4Meadows C. A Cost-based Framework for Analysis of Denial of Service in Networks[J]. Journal of Computer Security, 2001, 9(1/2): 143-164.
  • 5Mahajan R, Bellovin S M, Floyd S, et al. Controlling High Bandwidth Aggregates in the Network[J]. ACM SIGCOMM Computer Communication Review, 2002, 32(3): 62-73.
  • 6Stoica I, Adkins D, Zhuang S, et al. Internet Indirection Infrastructure[C]//Proc. of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications. Pittsburgh, Pennsylvania, USA: [s. n.], 2002: 19-23.
  • 7Keromytis A, Misra V, Rubenstein D. SOS: Secure Overlay Services[C]//Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pittsburgh, Pennsylvania, USA: [s. n.], 2002:19-23.
  • 8Anderson T, Roscoe T, Wetherall D. Preventing linternet Denial-of-service with Capabilities[C]//Proc. of Hotnets-II. Cambridge, MA, USA:[s. n.], 2003.
  • 9The Network Simulator--NS2[Z]. http://www.isi.edu/nsnam/ns.
  • 10Software Tools for Game Theory[Z]. http://gambit.sourceforge.net.

共引文献43

同被引文献39

  • 1张仕斌,刘全,曾鸿.基于开放式网络环境的模糊自主信任模型[J].清华大学学报(自然科学版),2006,46(z1):1109-1114. 被引量:7
  • 2张仕斌,何大可,遠藤誉.基于模糊聚类的信任类型动态定义机制研究[J].计算机工程,2006,32(9):19-21. 被引量:18
  • 3Refaei M T, Srivastava V. DaSilva L. et al. A reputation based mechanism for isolating selfish nodes in ad-hoc networkslC1//Proc of the 2nd Annual Int Conf on Mobile and Ubiquitous Systems--Networking and Services (MobiQuitous 2{}{}5).New York:ACM.2005:3-1 1.
  • 4Juan Jos Jaramillo, R. Srikant. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks[J].Ad Hoc Networks, 2010, 8(04):416-429.
  • 5Russell Cooper, Douglas V. DeJong, Robert Forsythe. Cooperation without reputation: experimental evidence from prisoner's dilemma games[J]. ames and Economic Behavior, 1996, 12(02): 187-218.
  • 6[美]MlehaelE.whitman等,齐立博译.信息安全原理(第2版).清华大学出版社,2006.
  • 7谢建全.信息、系统安全防护技术.中国宇航出版社,2006.
  • 8Kong-wei Lye,Jeannette M. Wing.Game strategies in network security[J].International Journal of Information Security (-).2005(1-2)
  • 9Peng Liu,Wanyu Zang,Meng Yu.Incentive-based modeling and inference of attacker intent, objectives, and strategies[J].ACM Transactions on Information and System Security (TISSEC).2005(1)
  • 10黄海生,王汝传.基于隶属云理论的主观信任评估模型研究[J].通信学报,2008,29(4):13-19. 被引量:78

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部