期刊文献+

基于演化博弈的拟态防御策略优化

Defense strategy optimization of cyber mimic defensebased on evolutionary game theory
下载PDF
导出
摘要 网络空间拟态防御是近些年出现的一种主动防御理论,以异构冗余和动态反馈机制不断调整执行环境来抵抗攻击。然而,面对黑客的多样化攻击手段,仅凭借拟态防御抵抗攻击是不安全的。为了增强系统的安全防御能力,在目前已有的防御系统基础上提出更为合理的防御选取方法。将有限理性的演化博弈引入到拟态防御中,构建了由攻击者、防御者和合法用户组成的三方演化博弈模型,并提出了最优防御策略求解方法。该博弈模型利用复制动态方程得到了演化稳定策略。仿真实验结果表明,系统通过执行推理的演化稳定策略可以降低损失,遏制攻击方的攻击行为,对拟态防御系统中防御策略选取和安全性增强具有一定的借鉴意义。 As an active defense technology,cyber mimic defense uses heterogeneous redundancy and dynamic feedback mechanism to constantly adjust the execution environment of defense system to resist attacks.However,in the face of diverse attack methods of hackers,it is unsafe to resist attacks by only relying on cyber mimic defense.In order to enhance the security defense capability of the system,this paper proposed a more reasonable defense selection method based on the existing defense system.It applied evolutionary game theory of bounded rationality to cyber mimic defense,constructed a three-party evolutionary game model consisting of attackers,defenders and legitimate users,and proposed a solution method for the optimal defense strategy.This game model used the replication dynamic equation to obtain evolutionary stable strategy.The simulation results show that the system can reduce the loss and restrain the attack behavior by implementing the evolutionary stable strategy of reasoning,which has certain reference significance for the selection of defense strategy and security enhancement in cyber mimic defense system.
作者 王敏 付文昊 王宝通 石乐义 Wang Min;Fu Wenhao;Wang Baotong;Shi Leyi(Qingdao Institute of Software,College of Computer Science and Technology,China University of Petroleum(East China),Qingdao Shandong 266580,China)
出处 《计算机应用研究》 CSCD 北大核心 2024年第2期576-581,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(62111530052) 山东省自然科学基金资助项目(ZR2019MF034)。
关键词 拟态防御 主动防御 演化博弈 演化稳定策略 防御决策 cyber mimic defense(CMD) active defense evolutionary game theory evolutionary stable strategy defense decision-making
  • 相关文献

参考文献8

二级参考文献41

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 2冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 3李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 6BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 7SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 8BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 9ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 10FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.

共引文献329

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部