期刊文献+

基于贝叶斯Stackelberg博弈的Web安全问题研究 被引量:3

Web security research base on Bayesian Stackelberg game
下载PDF
导出
摘要 随着基于Web环境的互联网应用越来越广泛,Web应用的安全问题日益突出。针对黑客攻击Web应用的问题,提出一种基于贝叶斯Stackelberg博弈的Web安全应用模型。模型中提出了一种改进的收益计算方法,在综合考虑成本和收益参数的同时,将防御者的最优反击纳入考虑范畴,能够更加准确地计算攻防双方的支付矩阵。模型利用领导者的优势,利用DOBSS计算防守方的最优混合策略,分析证实了模型和分析方法的有效性。 With Web-based Interact application environment is becoming more and more widely, Web application security issues become increasingly prominent. For Web application hacking problems, presents a security application model based on Bayesian Stackelberg game. In this model ,an improved payoff calculation method is presented, which takes the counterattack as well as cost parameters and benefit parameters of both sides'strategies into account. And the payment of both offense and defense able to be calculated more accurately. Model uses the advantages of the leader, the defender can calculate the optimal mixed strategy with DOBSS algorithm. The example analysis proves the effectiveness of the model and algorithm.
出处 《电子技术应用》 北大核心 2015年第12期124-128,共5页 Application of Electronic Technique
基金 国家自然科学基金(61201173)
关键词 贝叶斯博弈 混合策略 WEB应用安全 STACKELBERG均衡 Bayesian game mixed strategy web security application Stackelberg equilibrium
  • 相关文献

参考文献14

  • 1YOU X, SHI Y Z.A kind of network security behavior model based on game theory[C].Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003.
  • 2TAMBE M,JAIN M,PITA J A,et al.Game theory for security : key algorithmic principles, deployed systems,lessons learned[C].In 50th Annual Allerton Conference on Communication, Control, and Computing, 2012.
  • 3Yin Zhengyu,ALBERT X J, MATrHEW P J, et al.Sullivan : TRUSTS-Scheduling Randomized Patrols for Fare Inspection in Transit Systems[C].In Proceedings of Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence(IAAI), Toronto, Canada, July 2012.
  • 4KORZHYK D, YIN Z, KIEKINTVELD C, et al.Stackelberg vs nash in security games-an extended investigation of interchangeability,equivalence and uniqueness[J].Journal of Artificial Intelligence Research,2011(4).
  • 5JORMAKKA J, MOLSA J V E.Modeling information warfare as a game[J].Journal of Information Warfare,2005,4(2).
  • 6NGUYEN K C, ALPCAN T,BASAR T.Stoehastic games for security in networks with independent nodes[J].Proceedings of International Conference on Game Theory for Networks (GameNets), 2009.
  • 7SUN W, KONG X, HE D, et al.Information security invest- ment game with penalty parameter[C].The 3rd International Conference on Innovative Computing Information and Control, 2008.
  • 8SUN W, KONG X, HE D, et al.Information security problem research based on game theory[C].International Symposium on Publication Electronic Commerce and Security, 2008.
  • 9C.Xiaolin, T.Xiaobin, YONG Z, et al.A Markov game theory-based risk assessment model for network information systems[C].International conference on computer science and software engineering, 2005.
  • 10PARUCHURI P, PEARCE J P, MARECKI J,et al.Playing games with security:an efficient exact algorithm for bayesian stackelberg games[C].In Proc.of The 7th Intema- tionalConference on Autonomous Agents and Muhiagent Systems (AAMAS), 2008.

同被引文献13

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部