期刊文献+

基于信号博弈的主动防御模型 被引量:3

Game model with active defense based on signaling game
下载PDF
导出
摘要 为了更贴近网络实际,针对当前网络攻防信息不均衡和网络对抗动态性的问题,提出了一种具有主动防御功能的信号博弈模型。在不完全信息约束条件下,通过释放不同防御虚假信号,构建了攻防策略博弈树对攻击者和防御者策略进行了建模,并利用网络伪装信号降低攻击策略的成功率;对存在的各类均衡进行了分析,设计了博弈模型求解方法,并在此基础上给出了最优防御策略。最后,通过仿真实验证明了模型的可操作性和有效性,并对实验结果进行了分析和总结。 In order to get closer to the reality of the network, aiming at the imbalance of information of network attackdefense and the dynamics of network confrontation, a signaling game model with active defense is proposed. In the condition of incomplete information, the game tree of attack-defense strategy is built to model the strategies of attackers and defenders,and the success rate of the attack strategy is reduced by using the camouflage signal. Based on the analysis of the equilibrium,the game model is designed and the optimal defense strategy is given. Finally, through the analysis and summary of the experimental results, the maneuverability and effectiveness of the model are proved.
作者 张为 苏旸 陈文武 ZHANG Wei;SU Yang;CHEN Wenwu(Key Laboratory of Network and Information Security under the Chinese Armed Police Force,Engineering University ofChinese Armed Police Force,Xi’an 710086,China;Institute of Information Security,Engineering University of Chinese Armed Police Force,Xi’an 710086,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第17期77-82,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61103231)
关键词 信号博弈 网络攻防 博弈均衡 策略选取 signaling game network attack and defense game equilibrium strategies selection
  • 相关文献

参考文献2

二级参考文献24

  • 1张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 2Afrand Agah, Das Sajal K. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach [J]. International Journal of Network Security, 2007, 5(2): 145-153.
  • 3Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions [J]. Computer Communications, 2008, 31(10): 1934-1944.
  • 4Liu Yu, Cristian C, Hong Man. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C/OL] // ProcofValuetools's06. 2006= 11-13 E2010 03 08]. http:// citeseerx, ist. psu. edu/viewdoc/summary?doi= 10. 1.1.86. 8169.
  • 5Theodorakopoulos G, Baras J S. Game theoretic modeling of malicious users in collaborative networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(7): 1317- 1327.
  • 6Kotenko I. Multi-agent modelling and simulation of cyber attacks and cyber-defense for homeland security [J].Information & Automation, 2007, 11(8): 614-619.
  • 7Chen Y, Boehm B, Sheppard L. Value driven security threat modeling based on attack path analysis [C] ]/Proc of the 40th Annual Hawaii Int Conf on System Sciences. Los Alamitos, CA:IEEE Computer Society, 2007.
  • 8Lye K, Wing J M. Game strategies in network security [J]. International Journal of Information Security, 2005, 4 (1): 71-86.
  • 9Ma Yizhong, Cao Hui, Ma Jun. The intrusion detection method based on game theory in wireless sensor network [C/OL] //Proc of 1st IEEE Int Conf on Ubi-Media Computing. 2008:326-331 [2009 -10-01]. http://ieeexplore. ieee. org/xpl/freeabs all. jsp?arnumber= 4570911.
  • 10Wang L, Islam T, Long T, et al. An attack graph-based probabilistic security metric [G] //LNCS 5094. Berlin: Springer, 2008:283 -296.

共引文献77

同被引文献29

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部