期刊文献+

基于博弈模型的网络防御

Network Defense Based on Game Model
下载PDF
导出
摘要 基于博弈模型的网络防御体系构建,使现阶段网络安全管理水平得以有效提升,为未来阶段网络安全发展提供了有效的技术支持。笔者将根据网络防御及网络攻击特点,阐述博弈模型在网络安全防御方面的实际作用及应用内容,以此为更为高效运用博弈模型建立网络防御管理体系提出参考性建议。 The construction of network defense system based on game model enables the level of network security management to be improved effectively at the present stage and provides effective technical support for the development of network security in the future stage. According to the characteristics of network defense and network attack, the author expounds the practical function and application content of game model in network security defense, in order to put forward some reference suggestions for the more efficient use of game model to establish network defense management system.
作者 许晓燕 Xu Xiaoyan(Sanmenxia Vocational and Technical College,Sanmenxia Henan 472000,Chin)
出处 《信息与电脑》 2018年第14期216-218,共3页 Information & Computer
关键词 博弈模型 网络防御 网络安全 game model network defense network security
  • 相关文献

参考文献4

二级参考文献40

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2曹晖,王青青,马义忠,罗平.基于动态贝叶斯博弈的攻击预测模型[J].计算机应用,2007,27(6):1545-1547. 被引量:13
  • 3BROWNE R. C 4 I defensive infrastructure for survivability against multi-mode attack [ C]// Proceedings of the 21st Century Military Communication - Architectures and Technologies for Information Su-periority. Washington, DC: IEEE Computer Society, 2000, 1:417 - 424.
  • 4LYE K, WING J M. Game strategies in network security[ J]. Inter- national Journal of Information Security, 2005, 4(1) : 71 - 86.
  • 5HADI O, MONA M, CHADI A, et al. Game theoretic models for detecting network intrusions[ J]. Computer Communications, 2005, 31(10): 1934-1944.
  • 6SALLHAMMAR K, HELVIK B E, KNAPSKOG S J. On stochastic modeling for integrated security and dependability evaluation[ J]. Journal of Networks, 2006, 1(5) : 31 -42.
  • 7ROBERT G. A primer in game theory[ M]. Princeton: Princeton U- niversity Press, 1992.
  • 8OSBORNE M J, RUBINSTEIN A, AUMANN R, et al. A course in game theory [ M]. 2nd ed. Cambridge: MIT Press, 1994.
  • 9Poolsappasit N , Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1) :61-74.
  • 10Noel S,Jajodia S, Wang Lingyu, et al. Measuring security risk of networks using attack graphs[J] . InternationalJournal of Next-Generation Computing, 20IO,1 (1) :135-147.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部