期刊文献+

静态贝叶斯博弈在信息系统风险分析中的应用 被引量:7

Application of static Bayesian game in information system risk analysis
下载PDF
导出
摘要 信息系统安全风险受到攻击方和防御方的共同影响,因此在分析安全风险时必须综合考虑双方的行为。由此提出一种基于静态贝叶斯博弈的安全风险预测模型(APM-SBG),在模型中提出了一种改进的收益矩阵计算方法,在综合考虑成本和收益参数的同时,将防御者的反击行为纳入考虑范畴,能够更加准确地计算攻防双方的支付。模型利用混合策略对博弈的均衡局势进行分析,在理性假设下对攻击方行为进行有效预测。提出了一种基于攻击预测和防御策略的信息系统安全风险的分析算法,实际算例分析证实了模型和分析方法的有效性。 Information System(IS)security risk is influenced by attackers and defenders, so it is necessary to consider the behaviors of both sides. To evaluate the risk level, an Attacks Prediction Model based on Static Bayesian Game(APM-SBG)is proposed. In this model, an improved payoff calculation method is presented, which takes the counterattack as well as cost parameters and benefit parameters of both sides' strategies into account, and therefore the payoff could be calculated more accurately. Considering the uncertainty of strategy choice, Nash equilibrium of the game based on mixed strategy is analyzed to predict the behaviors of the attacker, and the result is credible. A new risk analysis method is proposed based on the attack behavior prediction and defense strategy. The example analysis proves the effectiveness of the model and algorithm.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第11期76-82,共7页 Computer Engineering and Applications
基金 国家部委预研基金
关键词 贝叶斯博弈 混合策略 风险分析 纳什均衡 收益函数 Bayesian game mixed strategy risk analysis Nash equilibrium payoff function
  • 相关文献

参考文献11

二级参考文献110

共引文献236

同被引文献60

  • 1刘宗谦,王峰.多重均衡选择中的风险占优与混合策略[J].数学的实践与认识,2005,35(5):216-224. 被引量:3
  • 2顼志芬,尉胜伟,徐澄.工程项目全过程风险管理模式探讨[J].管理工程学报,2005,19(B10):207-209. 被引量:23
  • 3方滨兴.解读信息安全创新突破点[EB/OL].[2015-10-28].http://www.cert.org.cn/2007051823317.html.
  • 4Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.
  • 5Ou Xinming,Boyer W F.A scalable approach to attack graph generation[C]//13th ACM Conference on Computer and Communications Security(CCS),2006:336-345.
  • 6Ou X.Mul Val[EB/OL].(2011-04-24)[2015-10-28].http://people.cis.ksu.edu/~xou/mulval/.
  • 7Jajodia S,Noel S.Topological vulnerability analysis:a powerful new approach for network attack prevention,detection,and response[M]//Algorithms,architectures and information systems security.[S.l.]:World Scientific,2008:285-305.
  • 8Poolsappasit N,Dewri R,Ray I.Dynamic security risk management using Bayesian attack graphs[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):61-74.
  • 9Yigit B,Gur G,Alagoz F.Cost-aware network hardening with limited budget using compact attack graphs[C]//IEEE Military Communications Conference,2014:152-157.
  • 10Kennedy J,Eberhart R.Particle swarm optimization[C]//IEEE International Conference on Neural Networks,1995:129-132.

引证文献7

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部