期刊文献+

攻防博弈下的Ad hoc网络风险预测 被引量:4

Risk Prediction of Ad Hoc Network Based on Game
下载PDF
导出
摘要 利用博弈论原理,分析Ad hoc网络入侵防御系统与攻击者之间的攻防过程,建立了多阶段动态博弈下的网络风险预测模型。综合考虑Ad hoc网络不同节点与不同攻防措施对网络风险影响的差异性,量化攻防效用矩阵;通过求解纳什均衡,得到攻防双方最优混合策略;根据风险值求解算法,预测攻防平衡下的网络风险值。仿真实验表明,该模型和算法切实可行,对提升Ad hoc网络安全有一定参考价值。 With the principle of game theory,the attack and defense process between the intrusion prevention system of Ad Hoc network and the attacker is analyzed,and the network risk Prediction model under the multi-stage dynamic game is established.In quantifying the utility matrix of attack and defense,the difference of the influence of different nodes of Ad hoc network and different attack and defense measures on network risk is considered.By solving Nash equilibrium,the optimal mixing strategy of both attack and defense is obtained.Finally,the network risk prediction value under the attack and defense balance is predicted based on the risk solving algorithm.Simulation results show that the model and the algorithm are feasible and there is certain reference value for improving Ad hoc network security.
作者 陈赵懿 高秀峰 王帅 CHEN Zhao-yi;GAO Xiu-feng;WANG Shuai(Equipment Simulation Training Center,Army Engineering University,Shijiazhuang 050003,China)
出处 《火力与指挥控制》 CSCD 北大核心 2020年第8期16-21,共6页 Fire Control & Command Control
基金 国家自然科学基金(61271152) 军内科研基金资助项目(130105197302074514)。
关键词 Ad hoc 风险预测 动态博弈 贝叶斯 Ad hoc risk prediction dynamic game bayesian
  • 相关文献

参考文献3

二级参考文献72

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 4Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 5Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 6Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 7Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 8Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 9P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 10Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.

共引文献80

同被引文献32

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部