期刊文献+

基于不完全信息博弈的网络攻防策略分析

Analysis of Network Attack and Defense Strategies Based on Incomplete Information Game
下载PDF
导出
摘要 为了分析信息安全中网络攻防双方对抗行动最优策略的选取,构建了基于不完全信息博弈的网络攻防模型,给出了该模型纳什均衡的求解方法。该模型及方法着眼于攻防双方行动的相互影响和对抗过程的动态变化,通过对攻防博弈中选取不同策略的不同收益进行计算,分析攻防双方最优策略的选取。最后还通过仿真实验对模型进行检验,结果表明,该模型符合网络攻防实际,且简单可行。 To analyze optimal strategy selection of network attack and defense confrontational actions in information security,a network attack and defense model based on incomplete information game is established,the solution method of the game Nash equilibrium is given.The model and method focus on the mutual effects of the actions of both attackers and defenders and dynamic change of confrontation process,the different benefits of selecting different strategies from attack and defense game is calculated,the selection of optimal strategy of attacker and defender is analyzed.Finally,the simulation experiments test this model,the results show the model is in line with the reality of network attack and defense,it is simple and feasible.
作者 郑合锋 陈四军 ZHENG Hefeng;CHEN Sijun(The Big Data Institute,Qingdao Yellow Sea College,Qingdao 266427,China;Unit 31106 of PLA,Nanjing 210016,China)
出处 《火力与指挥控制》 CSCD 北大核心 2023年第8期67-73,80,共8页 Fire Control & Command Control
关键词 网络信息安全 博弈论 网络攻防 模型 network information security game theory network attack and defense model
  • 相关文献

参考文献3

二级参考文献43

  • 1宋彪,朱建明.基于业务流程的ERP信息安全进化熵的风险评估[J].通信学报,2012,33(S1):210-215. 被引量:2
  • 2Staniford S,Paxson V,Weaver N.How to own the Internet in your spare time.In:Proc.of the 11th USENIX Security Symp.2002.149-167.
  • 3Moore D,Shannon C,Voelker GM.Internet quarantine:Requirements for containing self-propagating code.In:Proc.of the 22ndAnnual Joint Conf.of the IEEE Computer and Communications Societies(INFOCOM 2003).2003.1869-1879.[doi:10.1109/INFCOM.2003.1209212].
  • 4Brumley D,Liu LH,Poosankam P,Song D.Design space and analysis of worm defense strategies.In:Proc.of the 2006 ACMSymp.on Information,Computer and Communications Security(ASIACCS 2006).2006.125-137.[doi:10.1145/1128817.1128837].
  • 5Wei Y.Analyzing the performance of Internet worm attack approaches.In:Proc.of the 13th Int’l Conf.on ComputerCommunications and Networks(ICCCN 2004).2004.501-506.[doi:10.1109/ICCCN.2004.1401717].
  • 6Nicol DM,Liljenstam M.Models and analysis of active worm defense.In:Proc.of the MMM-ACNS 2005.LNCS 3685,Heidelberg:Springer-Verlag,2005.38-53.[doi:10.1007/11560326_4].
  • 7Liljenstam M,Nicol DM.Comparing passive and active worm defenses.In:Proc.of the 1st Int’l Conf.on the QuantitativeEvaluation of Systems(QEST 2004).2004.18-27.[doi:10.1109/QEST.2004.1348012].
  • 8Mohi M,Movaghar A,Zadeh PM.A Bayesian game approach for preventing DoS attacks in wireless sensor networks.In:Proc.ofthe 2009 WRI Int’l Conf.on Communications and Mobile Computing.2009.507-511.[doi:10.1109/CMC.2009.325].
  • 9Liu Y,Cristina C,Hong M.A Bayesian game approach for intrusion detection in wireless ad hoc networks.In:Proc.of the 2006Workshop on Game Theory for Communications and Networks.2006.[doi:10.1145/1190195.1190198].
  • 10Scalable simulation framework.http://www.ssfnet.org/homePage.html.

共引文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部