浏览全部资源
扫码关注微信
1. 信息工程大学,河南 郑州 450001
2. 数学工程与先进计算国家重点实验室,河南 郑州 450001
[ "黄健明(1992-),男,湖南张家界人,信息工程大学硕士生,主要研究方向为网络安全主动防御。" ]
[ "张恒巍(1978-),男,河南洛阳人,博士,信息工程大学讲师,主要研究方向为网络安全行为分析、信息安全风险评估。" ]
[ "王晋东(1966-),男,山西洪桐人,信息工程大学教授,主要研究方向为网络与信息安全、云资源管理。" ]
[ "黄世锐(1994-),男,广东汕头人,信息工程大学硕士生,主要研究方向为网络安全预警与预测。" ]
网络出版日期:2017-01,
纸质出版日期:2017-01-25
移动端阅览
黄健明, 张恒巍, 王晋东, 等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017,38(1):168-176.
Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, et al. Defense strategies selection based on attack-defense evolutionary game model[J]. Journal on communications, 2017, 38(1): 168-176.
黄健明, 张恒巍, 王晋东, 等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017,38(1):168-176. DOI: 10.11959/j.issn.1000-436x.2017019.
Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, et al. Defense strategies selection based on attack-defense evolutionary game model[J]. Journal on communications, 2017, 38(1): 168-176. DOI: 10.11959/j.issn.1000-436x.2017019.
当前运用博弈理论的网络安全研究方法大多采用完全理性假设,与实际情况并不相符。从网络攻防对抗的有限理性约束出发,基于非合作演化博弈理论,构建攻防演化博弈模型,提出演化稳定均衡的求解方法。在分析演化稳定策略的基础上,设计了最优防御策略选取算法。通过仿真实验验证了所提模型和方法的有效性,并且分析、总结了有限理性限制下攻防行为的演化规律。
Due to that the current network security researches based on game theory mostly use the completely rationality assumption
which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense
attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results
through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.
姜伟 , 方滨兴 , 田志宏 . 基于攻防随机博弈模型的防御策略选取研究 [J ] . 计算机研究与发展 , 2013 , 47 ( 10 ): 1714 - 1723 .
JIANG W , FANG B X , TIAN Z H . Research on defense strategies selection based on attack-defense stochastic game model [J ] . Journal of Computer Research and Development , 2013 , 47 ( 10 ): 1714 - 1723 .
FALLAH M S . A puzzle-based defense strategy against flooding attacks using game theory [J ] . Dependable and Secure Computing , 2016 , 67 ( 1 ): 5 - 19 .
林旺群 , 王慧 , 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究 [J ] . 计算机研究与发展 , 2013 , 48 ( 2 ): 306 - 316 .
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory [J ] . Journal of Computer Research and Development , 2013 , 48 ( 2 ): 306 - 316 .
ANDERSON R , . Why information security is hard:an economic perspective [C ] // 17th Annual Computer Security Application Conference . Washington,DC,USA:IEEE Computer Society , 2016 : 39 - 40 .
BASUS S , WONG J . A taxonomy of intrusion response systems [J ] . International Journal of Information and Computer Security , 2015 , 1 ( 1/2 ): 169 - 184 .
SHEN S G , LI Y J , XU H Y . Signaling game based strategy of intrusion detection in wireless sensor networks [J ] . Computers & Mathematics with Applications , 2016 , 62 ( 6 ): 2404 - 2416 .
张恒巍 . 余定坤.韩继红,等.基于攻防信号博弈模型的防御策略选取方法 [J ] . 通信学报 , 2016 , 37 ( 5 ): 39 - 49 .
ZHANG H W , YU D K , HAN J H , et al . Defense policies selection method based on attack-defense signaling game model [J ] . Journal on Communications , 2016 , 37 ( 5 ): 39 - 49 .
朱建明 . 基于博弈论的信息安全技术评价模型 [J ] . 计算机学报 , 2015 ( 4 ): 828 - 834 .
ZHU J M . Evaluation model of information security technologies based on game theoretic [J ] . Chinese Journal of Computers , 2015 ( 4 ): 828 - 834 .
张勇 . 基于Markov 博弈模型的网络安全态势感知方法 [J ] . 软件学报 , 2016 , 22 ( 3 ): 495 - 508 .
ZHANG Y . Network security situation awareness approach based on markov game model [J ] . Journal of Software , 2016 , 22 ( 3 ): 495 - 508 .
CHENG D , HE F , QI H , et al . Modeling,analysis and control of networked evolutionary games [J ] . IEEE Transactions on Automatic Control , 2015 ( 99 ): 41 - 49 .
孙薇 . 基于演化博弈论的信息安全攻防问题研究 [J ] . 情报科学 , 2015 ( 9 ): 1408 - 1412 .
SUN W . Research on attack and deference in information security based on evolutionary game [J ] . Information Science , 2015 ( 9 ):14081412.
朱建明 , 宋彪 , 黄启发 . 基于系统动力学的网络安全攻防演化博弈模型 [J ] . 通信学报 , 2014 , 35 ( 1 ): 54 - 61 .
ZHU J M , SONG B , HUANG Q F . Evolution game model of offense-defense for network security based on system dynamics [J ] . Journal on Communications , 2014 , 35 ( 1 ): 54 - 61 .
王元卓 , 于建业 , 邱雯 . 网络群体行为的演化博弈模型与分析方法 [J ] . 计算机学报 , 2015 , 38 ( 2 ): 282 - 300 .
WANG Y Z , YU J Y , QIU W . Evolutionary game model and analysis methods for network group behavior [J ] . Chinese Journal of Computers , 2015 , 38 ( 2 ): 282 - 300 .
BALKENBORG D , SCHLAG K . On the interpretation of evolutionary stable sets in symmetric and asymmetric games [D ] . Mimeo:Bonn University Economics Department . 1994 .
DREW F , JEAN T . Game theory [M ] . Boston : Massachusettes Institute of Technology PressPress , 2012 .
0
浏览量
1768
下载量
14
CSCD
关联资源
相关文章
相关作者
相关机构