期刊文献+

基于系统先验信息的平台动态防御单阶段静态博弈策略

A Single Stage Static Game Strategy of Platform Dynamic Defense Based on System Prior Information
下载PDF
导出
摘要 针对平台动态防御中节点选择迁移的复杂性,设计了基于系统先验信息的单阶段静态博弈策略。从平台动态防御原理分析入手,结合攻防双方博弈关系和完全信息条件下的防御需求,构建了单阶段静态博弈模型,提出了攻防效用关键参数和完全信息博弈流程,通过示例给出了策略的具体实施过程。仿真结果表明,经过1000次攻防博弈实验后,防御方实际收益为4.403×10^4,攻击方实际收益为-1.625×10^5,所提策略能有效阻截网络攻击,防御方期望收益为4.324×10^4,实际收益偏差约1.8%,新策略的收益远高于无差别迁移策略,可解决传统平台动态防御中成本高、防御收支不平衡和节点迁移有效性等问题。 In view of the complexity of node selection and migration at platform dynamic defense,a single stage static game strategy is designed based on system prior information.Through analyzing from dynamic platform defense,a single stage static game model is constructed by combining the needs of the defense under conditions of game relationship between the two parties and complete information condition,and a process of the key parameters of the attack and defense utility and the complete information game is proposed.The demo and simulation results show that after 1000 times of attack defense game experiments,the actual revenue of the defense is 4.403×10^4,and the actual revenue of the attacker is-1.625×10^5,showing that the proposed strategy can effectively intercept cyber attacks.The expected revenue of the defense is 4.324×10^4,the deviation between the actual revenue and the expected revenue is about 1.8%.The revenue of the new strategy is much higher than that of the undifferentiated migration strategy.The single stage static game strategy based on the system prior information can solve the problems of high cost,unbalanced defense budget and effective node migration in the traditional platform dynamic defense.
作者 陈彤睿 马润年 王刚 冯云 王志屹 CHEN Tongrui;MA Runnian;WANG Gang;FENG Yun;WANG Zhiyi(Information and Navigation College,Air Force Engineering University,Xi’an 710077,China)
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2019年第6期84-90,共7页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金(61573017)
关键词 平台动态防御 完全信息博弈 攻击图 安全漏洞 platform dynamic defense complete information game attack graph security vulnerability
  • 相关文献

参考文献9

二级参考文献33

  • 1马琳茹,杨林,何俊,王建新.面向任务的量化风险评估方法[J].计算机工程与应用,2007,43(6):136-139. 被引量:5
  • 2国家质量监督检验检疫总局.GB/T20984--2007信息安全技术信息系统的风险评估规范[S].北京:中国标准出版社,2007.
  • 3Jajodia S, Noel S. Topological vulnerability analysis: A powerful new approach for network attack prevention, de- tection, and response [ M ]//Algorithms, Architectures and Information Systems Security. Singapore: World Scientific Publishing Company ,2008:285 - 305.
  • 4Ou Xinming, Boyer W F, McQueen M A. A scalable ap- proach to attack graph generation[ C ]//Proceedings of the 13th ACM Conference on Computer and Communications Security( CCS' 06). New York : ACM ,2006:336 - 345.
  • 5Ou Xinming,Homer J,Zhang Su,et al. MulVAL project at Kansas State University[EB/OL]. (2011- 12-4) [2015- 11 - 28 ]. http ://people. cis. ksu. edu/- xou/mulval/.
  • 6Xie Peng,Li J H,Ou Xinming,et al. Using Bayesian net- works for cyber security analysis [ C ]//Proceedings of 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Chicago : IEEE, 2010 : 211 - 220.
  • 7Homer J, Zhang S, Ou X, et al. Aggregating vulnerability mettles in enterprise networks using attack graphs [J]. lournal of Computer Security,2013,21(4) :561-597.
  • 8Poolsappasit N, Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs [ J ]. IEEE Transactions on Dependable and Secure Computing,2012, 9 ( 1 ) :61 - 7g.
  • 9Mell P, Scarfone K, Romanosky S. Common vulnerability scoring system [J]. IEEE Security & Privacy Magazine, 2006,4(6) :85 - 89.
  • 10姜伟,方滨兴,田志宏,张宏莉.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827. 被引量:153

共引文献99

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部