期刊文献+

基于人工智能的网络安全攻防技术创新研究

Research on Offensive and Defensive Technology Innovation of Network Security Based on Artificial Intelligence
下载PDF
导出
摘要 基于演化博弈理论,概述了网络攻防与博弈论的对应关系。在此基础上,研究运用该理论技术对网络安全攻防进行策略优化,通过模拟攻防群体演化博弈分析,得出稳定防御策略选择。证明模型实战应用价值,指导防御决策,促进网络安全维护,有利于网络安全合规性发展。 Based on evolutionary game theory,this paper first summarizes the corresponding relationship between network attack and defense and game theory.On this basis,this paper studies the strategy optimization of network security attack and defense by using this theoretical technology,and obtains the choice of stable defense strategy through the simulation of attack and defense group evolutionary game analysis.It proves the practical application value of the model,guides defense decisions,promotes network security maintenance,and is conducive to the development of network security compliance.
作者 邱红喜 QIU Hongxi(Hefei Professional College of Economics and Technology,Hefei 230031,China)
出处 《佳木斯大学学报(自然科学版)》 CAS 2024年第10期51-53,121,共4页 Journal of Jiamusi University:Natural Science Edition
关键词 人工智能 博弈论 网络安全 网络攻防 artificial intelligence game theory network security network attack and defense
  • 相关文献

参考文献3

二级参考文献36

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 3Sheyner O,Haines J,Jha S,Lippmann R,Wing J.Automated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy.Berkeley,CA,2002:273-284.
  • 4Jha S,Sheyner O,Wing J M.Two formal analyses of attack graphs//Proceedings of the Computer Security Foundations Workshop (CSFW).Cape Breton,Nova Scotia,2002:49-63.
  • 5Ramakrishnan C R,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security (JCS),2002,10(1/2):189-209.
  • 6Besson F,Jensen J,Métayer D L,Thorn T.Model checking security properties of control flow graphs.Computer Security,2001,9(3):217-250.
  • 7Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2001:156-165.
  • 8Wang D,Madan B,Trivedi K S.Security analysis of SITAR intrusion-tolerant system//Proceedings of the ACM Workshop Survivable and Self-Regenerative Systems.Fairfax,VA,2003:23-32.
  • 9Madan B,Goeva-Popstojanova K,Vaidyanathan K,Trivedi K S.A method for modeling and quantifying the security attributes of intrusion tolerant systems.Performance Evaluation,2004,56:167-186.
  • 10McDermott J.Attack-potential-based survivability modeling for high-consequence systems//Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05).Washington D.C.,2005:119-130.

共引文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部