期刊文献+

拟态式蜜罐诱骗特性的博弈理论分析 被引量:14

Game Theoretic Analysis for the Feature of Mimicry Honeypot
下载PDF
导出
摘要 该文基于非合作不完全信息动态博弈理论,形式化描述了拟态式蜜罐诱骗博弈的各局中人策略和收益,构建了诱骗博弈收益矩阵,推理分析了拟态式蜜罐诱骗博弈中存在的贝叶斯纳什均衡策略,通过进一步讨论博弈均衡条件和影响因素并与传统蜜罐博弈相比较,给出了拟态式蜜罐模型中保护色、警戒色等机制在诱骗博弈中的适用条件,证明了拟态式蜜罐模型具有更好的主动性、有效性和迷惑性。 This paper firstly gives the formalization description of both players’ strategies and payoffs in the mimicry honeypot game,and constructs the payoff matrix of the fraudulent game using non-cooperative and incomplete dynamic game theory.Then the equilibrium strategies and the equilibrium conditions are inferred.The equilibrium conditions and relative factors are discussed in detail,and the comparison to traditional honeypot is also performed.The theoretic analysis depicts the effective condition for protective coloration and warning coloration mechanism in the fraudulent game,and demonstrates that the mimicry honeypot has better activeness,efficiency and fraudulence than the traditional scheme.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第5期1063-1068,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60973141) 山东省中青年科学家科研奖励基金(2009BSA05001) 中央高校基本科研业务费专项(27R0907018A 11CX04052A 11CX06085A)资助课题
关键词 信息安全 博弈理论 纳什均衡 蜜罐 伪蜜罐 拟态 Information security Game theory Nash equilibrium Honeypot Fake honeypot Mimicry
  • 相关文献

参考文献3

二级参考文献45

  • 1张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 2Afrand Agah, Das Sajal K. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach [J]. International Journal of Network Security, 2007, 5(2): 145-153.
  • 3Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions [J]. Computer Communications, 2008, 31(10): 1934-1944.
  • 4Liu Yu, Cristian C, Hong Man. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C/OL] // ProcofValuetools's06. 2006= 11-13 E2010 03 08]. http:// citeseerx, ist. psu. edu/viewdoc/summary?doi= 10. 1.1.86. 8169.
  • 5Theodorakopoulos G, Baras J S. Game theoretic modeling of malicious users in collaborative networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(7): 1317- 1327.
  • 6Kotenko I. Multi-agent modelling and simulation of cyber attacks and cyber-defense for homeland security [J].Information & Automation, 2007, 11(8): 614-619.
  • 7Chen Y, Boehm B, Sheppard L. Value driven security threat modeling based on attack path analysis [C] ]/Proc of the 40th Annual Hawaii Int Conf on System Sciences. Los Alamitos, CA:IEEE Computer Society, 2007.
  • 8Lye K, Wing J M. Game strategies in network security [J]. International Journal of Information Security, 2005, 4 (1): 71-86.
  • 9Ma Yizhong, Cao Hui, Ma Jun. The intrusion detection method based on game theory in wireless sensor network [C/OL] //Proc of 1st IEEE Int Conf on Ubi-Media Computing. 2008:326-331 [2009 -10-01]. http://ieeexplore. ieee. org/xpl/freeabs all. jsp?arnumber= 4570911.
  • 10Wang L, Islam T, Long T, et al. An attack graph-based probabilistic security metric [G] //LNCS 5094. Berlin: Springer, 2008:283 -296.

共引文献75

同被引文献112

  • 1胡经,罗万伯,刘晓锋,雷开春.基于“动态自适应安全模型”的网络安全预警系统[J].信息安全与通信保密,2004(8):32-34. 被引量:2
  • 2李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 3陈运明.动态网络安全模型的系统研究[J].网络安全技术与应用,2005(5):47-49. 被引量:13
  • 4王霄,薛质,王轶骏.基于蜜罐的入侵检测系统的博弈分析与设计[J].信息安全与通信保密,2007,29(12):94-95. 被引量:2
  • 5Hayatle O,Otrok H,Youssef A.A Game Theoretic Investigation for High Interaction Honeypots[C]// Communications(ICC),2012 IEEE Intemational Conference on.USA:IEEE,2012:6662-6667.
  • 6Wagener Q Dulaunoy A,Engel T.Self Adaptive High Interaction Honeypots Driven by Game Theory[J].Lecture Notes in Computer Science(S0302-9743),2009,5873(11):741-755.
  • 7Pibil R,Lisy V,Kiekintveld C,et al.Game theoretic model of strategic honeypot selection in computer networks[M]// Decision and Game Theory for Security.Germany:Springer Berlin Heidelberg,2012:201-220.
  • 8Wei L,Wang X.Research on honeypot information fusion based on game theory[C]// Computer Research and Development,2010 Second Intemational Conference on.USA:IEEE,2010:803-806.
  • 9Li H,Yang X,Qu L.On the offense and defense game in the network honeypot[M]// Advances in Automation and Robotics,Germany:Springer Berlin Heidelberg.2012,2:239-246.
  • 10Cai J,Yegneswaran V,Alfeld C.Honey games:a game theoretic approach to defending network monitors[J].Journal of Combinatorial Optimization(SI382-6905),2011,22(8):305-324.

引证文献14

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部