期刊文献+

IoT Security Situational Awareness Based on Q-Learning and Bayesian Game

原文传递
导出
摘要 IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of attack or defense,but lackconsideration of joint actions by both parties.Applying gametheory to security situational awareness can measure the impact of the opposition and interdependence of the offensive and defensive parties.This paper proposes an IoT security situational awareness method based on Q-Learning and Bayesian game.Through Q-Learning update,the long-term benefits of action strategies in specific states were obtained,and static Bayesian game methods were used to solve the Bayesian Nash Equilibrium of participants of different types.The proposed method comprehensively considers offensive and defensive actions,obtains optimal defense decisions in multi-state and multi-type situations,and evaluates security situation.Experimental results prove the effectiveness of this method.
出处 《国际计算机前沿大会会议论文集》 2021年第2期190-203,共14页 International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
基金 the National Key Research and Development Program of China(No.2017YFB1400700).
  • 相关文献

参考文献3

二级参考文献31

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 2赵国生,王慧强,王健.基于灰色关联分析的网络可生存性态势评估研究[J].小型微型计算机系统,2006,27(10):1861-1864. 被引量:25
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4ZONOUZ S A, KHURANA H, SANDERS W H. RRE: A Game-theoretic Intrusion Response and Recovery Engine [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2) : 395-406.
  • 5LIANG X N, XIAO Y. Game Theory for Network Security[J].IEEE Communications Surveys ~ Tutorials, 2013, 15 (1) : 472-486.
  • 6YU M, LIU C, QIU X L, et al. Modelling and Analysis of Phishing Attack Using Stochastic Game Nets [C]// International Conference on Cyberspace Technology. London: lET, 2013: 300-305.
  • 7WANG C L, MIAO Q, DAI Y Q. Network Survivability Analysis Based on Stochastic Game Model[C]//Proceedings of the 4th International Conference on Multimedia Information Networking and Security. Washington: IEEE Computer Society, 2012: 99-104.
  • 8NGUYEN K C, ALPCAN T, BASAR T. Security Games with Incomplete Information [C]//2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 5199443.
  • 9LIU P, ZANG W Y, YU M. Incentive-based Modeling and Inference of Attacker Intent, Objectives, and Strategies[J].ACM Transactions on Information and System Security, 2005, 8(1): 78-118.
  • 10LIU Y, COMANICIU C, MAN H. A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoe Networks [C] //Proceedings of the 2006 Workshop on Game Theory for Communications and Networks. New York: ACM, 2006: 1190198.

共引文献196

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部