期刊文献+

基于随机博弈与A3C深度强化学习的网络防御策略优选

Network Defense Strategy Optimization Based on Stochastic Gaming and A3C Deep Reinforcement Learning
下载PDF
导出
摘要 网络资源的有限性和攻防对抗的动态性导致最优防御策略难以选取,将深度强化学习引入攻防随机博弈建模领域,通过构建网络攻防actor策略网络和critic价值网络,结合随机博弈模型构建了网络攻防博弈决策模型总体结构,在此基础上引入异步优势演员评论家算法(asynchronous advantage actor-critic,A3C)智能体学习框架设计了防御策略选取算法;针对现有方法未考虑攻击方群体间的共谋攻击,引入群智能体性格特征,建立合作系数μ来刻画攻击者之间的合作对攻防策略收益的影响,进而得出对防御策略选取的影响,构建的博弈决策模型更符合攻防实际情况。实验结果表明,该方法的策略求解速度要优于现有方法,同时由于考虑了攻击合作关系,能够用于分析攻击者群体间合作关系对防御者决策的影响,防御策略选取更有针对性,期望防御收益更高。 The limitation of network resources and the dynamics of attack-defense confrontation make it difficult to select the optimal defense strategy.Therefore,the deep reinforcement learning is introduced into the field of attack and defense stochastic game modeling.By constructing the network attack-defense actor strategy network and critical value network,the stochastic gaming model is combined,the overall architecture of the game decision-making model for network attack-defense is constructed.On this basis,the asynchronous advantage actor-critical(A3C)agent learning framework is introduced to design the defense strategy selection algorithm.In view of the fact that the existing methods do not consider the collusion attacks among the attacker groups,the personality characteristics of group agents are introduced by establishing cooperation factor μ to describe the impact of attacker cooperation on the benefits of attack-defense strategies as well as that on the selection of defense strategies.Therefore,the constructed game decision-making model more conforms to the realistic attack-defense situation better.The experimental results show that strategy calculating speed of the proposed method is better than the existing method.At the same time,as the attack cooperation relationship is considered,which can be used to analyze the impact of the cooperation relationship among attacker groups on the decision-making of the defenders.The defense strategy selection is more targeted and the expected defense benefits are expected to be higher.
作者 胡浩 赵昌军 刘璟 宋昱欣 姜迎畅 张玉臣 HU Hao;ZHAO Changjun;LIU Jing;SONG Yuxin;JIANG Yingchang;ZHANG Yuchen(Strategic Support Force Information Engineering University,Zhengzhou 450001,China)
出处 《指挥与控制学报》 CSCD 北大核心 2024年第1期47-58,共12页 Journal of Command and Control
基金 国家自然科学基金(61902427)资助。
关键词 网络攻防 最优防御决策 随机博弈 多智能体 A3C算法 cyber security optimal defense decision-making stochastic gaming multi-agent A3C algorithm
  • 相关文献

参考文献6

二级参考文献75

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 3冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 4Sheyner O,Haines J,Jha S,Lippmann R,Wing J.Automated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy.Berkeley,CA,2002:273-284.
  • 5Jha S,Sheyner O,Wing J M.Two formal analyses of attack graphs//Proceedings of the Computer Security Foundations Workshop (CSFW).Cape Breton,Nova Scotia,2002:49-63.
  • 6Ramakrishnan C R,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security (JCS),2002,10(1/2):189-209.
  • 7Besson F,Jensen J,Métayer D L,Thorn T.Model checking security properties of control flow graphs.Computer Security,2001,9(3):217-250.
  • 8Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2001:156-165.
  • 9Wang D,Madan B,Trivedi K S.Security analysis of SITAR intrusion-tolerant system//Proceedings of the ACM Workshop Survivable and Self-Regenerative Systems.Fairfax,VA,2003:23-32.
  • 10Madan B,Goeva-Popstojanova K,Vaidyanathan K,Trivedi K S.A method for modeling and quantifying the security attributes of intrusion tolerant systems.Performance Evaluation,2004,56:167-186.

共引文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部