期刊文献+

基于博弈的蜜罐和入侵检测系统最优配置策略 被引量:3

Analysis on Optimal Configuration Strategies of Honeypot and Intrusion Detection Systems Based on Game Theory
下载PDF
导出
摘要 根据网络攻防的工作量不对称、信息不对称和后果不对称,运用博弈理论与信息安全经济学,构建了蜜罐和入侵检测系统的信息安全技术组合模型。通过比较两种情况下公司和黑客博弈的纳什均衡混合策略,以及不同技术配置下人工调查概率的大小,探讨了入侵检测系统的检测概率和蜜罐个数对最优配置策略的影响,提出了配置两种技术时的预算范围,从而给出蜜罐和入侵检测系统技术组合的最优配置。最后,通过实例进一步验证了相关结论。 Focusing on workload asymmetry,information asymmetry,and consequences asymmetry between attackers and defenders,the model of information security technology combination of honeypot and intrusion detection systems(IDS)is constructed by using the game theory and economics of information security.The Nash equilibrium mixed strategies of the firm and hackers in two cases,and the manual investigation probabilities at different technical deployments are compared.The influence of the detection probability of the IDS and the number of honeypots on the optimal configuration strategy is discussed.Then,the range of configuration budget when deploying two technologies is proposed.Thus the optimal configuration strategy of the combination of honeypot and IDS is made.Finally,the relative conclusion is illustrated further by an example.
作者 赵柳榕 梅姝娥 仲伟俊 ZHAO Liurong;MEI Shue;ZHONG Weijun(School of Economics and Management, Nanjing Technology University, N anjing 211816, China;School of Economics and Management, Southeast University, Nanjing 211189, China)
出处 《系统管理学报》 CSSCI CSCD 北大核心 2018年第3期512-519,共8页 Journal of Systems & Management
基金 国家社会科学基金资助项目(15BTQ052) 江苏省社会科学基金资助项目(17GLD008) 江苏省高校哲学社会科学基金资助项目(2016SJB630031) 江苏省博士后基金资助项目(1701080C) 中国博士后基金资助项目(2018M630544)
关键词 蜜罐 入侵检测系统 博弈论 信息安全经济学 honeypot intrusion detection systems(IDS) game theory information security economics
  • 相关文献

参考文献3

二级参考文献41

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in IT security. Information Systems Research, 2005, 16(1): 28-46
  • 5Athanasiades N, Abler R, Levine Jet al. Intrusion detection testing and benehmarking methodologies//Proceedings of the 1st IEEE International Workshop on Information Assurance. Darmstadt, Germany: IEEE Computer Society, 2003: 63-72
  • 6Ulvila J W, Gaffney J E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 2004, 1(1): 39-54
  • 7Ryu Y U, Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4):20.1 -20. 24
  • 8Sabahi F, Movaghar A. Intrusion detection: A survey//Proceedings of the 3rd International Conference on Systems and Networks Communications (ICSNC' 08). Sliema, Malta, 2008:23-26
  • 9Poe James, Li Tao. BASS: A benchmark suit for evaluating architectural security systems. ACM SIGARCH Computer Architecture News, 2006, 34(4): 26-33
  • 10Cavusoglu Huseyin, Mishra Birendra, Raghunathan Srinivasan. A model for evaluating IT security investments. Communications of the ACM, 2004, 47(7): 87-91

共引文献49

同被引文献21

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部