期刊文献+

基于信令博弈的网络诱骗防御策略分析与仿真 被引量:5

Signaling Game Analysis and Simulation on Network Decoy Defense Strategies
下载PDF
导出
摘要 将网络诱骗攻防视作一种可观察行为的多阶段信令博弈,运用信令博弈理论分步骤构建了四种网络诱骗攻防博弈模型,即正常服务系统、服务/蜜罐混合系统、两种发送信令的服务/蜜罐混合系统以及三种行动/两种信令的服务/蜜罐混合系统。信令博弈模型中,服务方发送正常信令或蜜罐信令,而攻击者选择访问、判断访问或不访问。通过求解信令博弈模型的贝叶斯均衡策略及均衡条件,推理分析了网络诱骗防御策略的有效性及其约束条件。在此基础上,进一步采用博弈仿真工具Gambit对网络诱骗攻防信令博弈过程进行了仿真测试,验证了博弈理论分析贝叶斯均衡策略的存在性和正确性。 The network decoy confrontation is regarded as a kind of observable behavior of a multi-stage signaling game. Four types of gaming models for decoy confrontation process were constructed step by step using signaling game theory, i.e. the normal service, the mixed system of normal service and honeypot, the mixed system with two kinds of signaling, and the mixed system with two kinds of signaling and three actions. In these signaling game models, the server sent a normal signaling or honeypot signaling as the sender, while the attacker chose to access, give up or access in condition as the receiver. The effectiveness and the effectiveness conditions of the network decoy strategy were demonstrated through solving the Bayesian equilibrium strategies and analyzing the equilibrium conditions. Gambit as a game simulation tool was used to simulate the signaling game process of network decoy confrontation, and the existence of the Bayesian equilibrium, the correctness of the theoretical analysis were validated.
出处 《系统仿真学报》 CAS CSCD 北大核心 2016年第2期348-353,共6页 Journal of System Simulation
基金 国家自然科学基金(91438117 61309024)
关键词 信令博弈 网络诱骗防御 贝叶斯均衡 仿真 signaling game network decoy defense Bayesian equilibrium simulation
  • 相关文献

参考文献14

  • 1贾珺,战晓苏,程文俊.基于灰色关联分析的网络战综合能力评估[J].系统仿真学报,2012,24(6):1185-1188. 被引量:10
  • 2Hayatle O,Otrok H,Youssef A.A Game Theoretic Investigation for High Interaction Honeypots[C]// Communications(ICC),2012 IEEE Intemational Conference on.USA:IEEE,2012:6662-6667.
  • 3Wagener Q Dulaunoy A,Engel T.Self Adaptive High Interaction Honeypots Driven by Game Theory[J].Lecture Notes in Computer Science(S0302-9743),2009,5873(11):741-755.
  • 4Pibil R,Lisy V,Kiekintveld C,et al.Game theoretic model of strategic honeypot selection in computer networks[M]// Decision and Game Theory for Security.Germany:Springer Berlin Heidelberg,2012:201-220.
  • 5Wei L,Wang X.Research on honeypot information fusion based on game theory[C]// Computer Research and Development,2010 Second Intemational Conference on.USA:IEEE,2010:803-806.
  • 6Li H,Yang X,Qu L.On the offense and defense game in the network honeypot[M]// Advances in Automation and Robotics,Germany:Springer Berlin Heidelberg.2012,2:239-246.
  • 7Cai J,Yegneswaran V,Alfeld C.Honey games:a game theoretic approach to defending network monitors[J].Journal of Combinatorial Optimization(SI382-6905),2011,22(8):305-324.
  • 8Garg N,Grosu D.Deception in honeynets:A game-theoretic analysis[C]// Proceedings of IEEE Information Assurance and Security Workshop,New York,USA.USA:IEEE,2007:20-22.
  • 9Pauna A.Improved self adaptive honeypots capable of detecting rootkit malware[C]// Communications (COMM),20129th Intemational Conference on.USA:IEEE,2012:281-284.
  • 10王霄,薛质,王轶骏.基于蜜罐的入侵检测系统的博弈分析与设计[J].信息安全与通信保密,2007,29(12):94-95. 被引量:2

二级参考文献32

共引文献36

同被引文献30

引证文献5

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部