浏览全部资源
扫码关注微信
1. 西安邮电大学通信与信息工程学院,陕西 西安 710121
2. 西安邮电大学信息中心,陕西 西安 710121
[ "吴昊(1981-),男,江苏武进人,西安邮电大学讲师,主要研究方向为信息安全。" ]
[ "范九伦(1964-),男,河南温县人,博士,西安邮电大学教授,主要研究方向为信号处理和信息安全。" ]
[ "赖成喆(1985-),男,陕西汉中人,博士,西安邮电大学副教授,主要研究方向为信息安全。" ]
[ "刘建华(1963-),男,陕西宝鸡人,西安邮电大学高级工程师,主要研究方向为信息安全。" ]
网络出版日期:2018-08,
纸质出版日期:2018-08-25
移动端阅览
吴昊, 范九伦, 赖成喆, 等. 基于攻防博弈和蒙特卡洛模拟的网站防御策略选取方法[J]. 通信学报, 2018,39(8):48-55.
Hao WU, Jiulun FAN, Chengzhe LAI, et al. Website defense strategy selection method based on attack-defense game and Monte Carlo simulation[J]. Journal on communications, 2018, 39(8): 48-55.
吴昊, 范九伦, 赖成喆, 等. 基于攻防博弈和蒙特卡洛模拟的网站防御策略选取方法[J]. 通信学报, 2018,39(8):48-55. DOI: 10.11959/j.issn.1000-436x.2018131.
Hao WU, Jiulun FAN, Chengzhe LAI, et al. Website defense strategy selection method based on attack-defense game and Monte Carlo simulation[J]. Journal on communications, 2018, 39(8): 48-55. DOI: 10.11959/j.issn.1000-436x.2018131.
针对网络攻防对抗中的安全防御策略选取问题,研究攻防双方策略相互影响的动态变化过程。从攻防双方的博弈过程出发,构建攻防博弈模型,基于蒙特卡洛模拟法模拟攻击者的攻击过程,得到攻击者的最佳攻击效用,进而计算防御者的最佳防御效用。该方法实现了在有限的资源投入下选取最优的防御策略,以达到网络安全防御效用的最大化。仿真实验验证了该方法的有效性,并分析了不同参数设置对防御策略选取的影响。
Aiming at the selection of security defense strategy in network attack-defense
the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense
the attack-defense game model was constructed
the attack process of the attacker based on Monte Carlo simulation was simulated and the attacker’s best attack utility was obtained
so as to calculate the best defensive utility of the defender.In order to maximize the effectiveness of network security defense
the optimal defense strategy under limited resources was implemented.Simulation experiments verify the effectiveness of the proposed method and analyze the influence of different parameter settings on the selection of defense strategy.
ZHANG H G , HAN W B , LAI X J , et al . Survey on cyberspace security [J ] . Science China Information Sciences , 2015 , 58 ( 11 ): 1 - 43 .
龚俭 , 臧小东 , 苏琪 , 等 . 网络安全态势感知综述 [J ] . 软件学报 , 2017 , 28 ( 4 ): 1010 - 1026 .
GONG J , ZANG X D , SU Q , et al . Survey of network security situation awareness [J ] . Journal of Software , 2017 , 28 ( 4 ): 1010 - 1026 .
姜伟 , 方滨兴 , 田志宏 , 等 . 基于攻防随机博弈模型的防御策略选取研究 [J ] . 计算机研究与发展 , 2010 , 47 ( 10 ): 1714 - 1723 .
JIANG W , FANG B X , TIAN Z H , et al . Research on defense strategies selection based on attack-defense stochastic game model [J ] . Journal of Computer Research & Development , 2010 , 47 ( 10 ): 1714 - 1723 .
王元卓 , 于建业 , 邱雯 , 等 . 网络群体行为的演化博弈模型与分析方法 [J ] . 计算机学报 , 2015 , 38 ( 2 ): 282 - 300 .
WANG Y Z , YU J Y , WEN Q , et al . Evolutionary game model and analysis methods for network group behavior [J ] . Chinese Journal of Computers , 2015 , 38 ( 2 ): 282 - 300 .
LIANG X , XIAO Y . Game theory for network security [J ] . IEEE Communications Surveys & Tutorials , 2013 , 15 ( 1 ): 472 - 486 .
ROY S , ELLIS C , SHIVA S , et al . A survey of game theory as applied to network security [C ] // Hawaii International Conference on System Sciences . 2010 : 1 - 10 .
YANG R , KIEKINTVELD C , ORDONEZ F , et al . Improving resource allocation strategies against human adversaries in security games:an extended study [J ] . Artificial Intelligence , 2013 , 195 ( 1 ): 440 - 469 .
FALLAH M . A puzzle-based defense strategy against flooding attacks using game theory [J ] . IEEE Transactions on Dependable & Secure Computing , 2010 , 7 ( 1 ): 5 - 19 .
CHENG D , HE F , QI H , et al . Modeling,analysis and control of networked evolutionary games [J ] . IEEE Transactions on Automatic Control , 2015 , 60 ( 9 ): 2402 - 2415 .
王元卓 , 林闯 , 程学旗 , 等 . 基于随机博弈模型的网络攻防量化分析方法 [J ] . 计算机学报 , 2010 , 33 ( 9 ): 1748 - 1762 .
WANG Y Z , LIN C , CHENG X Q , et al . Analysis for network attack-defense based on stochastic game model [J ] . Chinese Journal of Computers , 2010 , 33 ( 9 ): 1748 - 1762 .
林旺群 , 王慧 , 刘家红 , 等 . 基于非合作动态博弈的网络安全主动防御技术研究 [J ] . 计算机研究与发展 , 2011 , 48 ( 2 ): 306 - 316 .
LIN W Q , WANG H , LIU J H , et al . Research on active defense technology in network security based on non-cooperative dynamic game theory [J ] . Journal of Computer Research & Development , 2011 , 48 ( 2 ): 306 - 316 .
高翔 , 祝跃飞 , 刘胜利 . 应用三角模糊矩阵博弈的网络安全评估研究 [J ] . 西安交通大学学报 , 2013 , 47 ( 8 ): 49 - 53 .
GAO X , ZHU Y F , LIU S L . Networks security assessment based on triangular fuzzy matrix game [J ] . Journal of Xi’an Jiaotong University , 2013 , 47 ( 8 ): 49 - 53 .
刘玉岭 , 冯登国 , 吴丽辉 , 等 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估 [J ] . 软件学报 , 2012 , 23 ( 3 ): 712 - 723 .
LIU Y L , FENG D G , WU L H , et al . Performance evaluation of worm attack and defense strategies based on static Bayesian game [J ] . Journal of Software , 2012 , 23 ( 3 ): 712 - 723 .
朱建明 , 宋彪 , 黄启发 . 基于系统动力学的网络安全攻防演化博弈模型 [J ] . 通信学报 , 2014 , 35 ( 1 ): 54 - 61 .
ZHU J M , SONG B , HUANG Q F . Evolution game model of offense-defense for network security based on system dynamics [J ] . Journal on Communications , 2014 , 35 ( 1 ): 54 - 61 .
张恒巍 , 余定坤 , 韩继红 , 等 . 基于攻防信号博弈模型的防御策略选取方法 [J ] . 通信学报 , 2016 , 37 ( 5 ): 51 - 61 .
ZHANG H W , YU D K , HAN J H , et al . Defense policies selection method based on attack-defense signaling game model [J ] . Journal on Communications , 2016 , 37 ( 5 ): 51 - 61 .
黄健明 , 张恒巍 , 王晋东 , 等 . 基于攻防演化博弈模型的防御策略选取方法 [J ] . 通信学报 , 2017 , 38 ( 1 ): 168 - 176 .
HUANG J M , ZHANG H W , WANG J D , et al . Defense strategies selection based on attack-defense evolutionary game model [J ] . Journal on Communications , 2017 , 38 ( 1 ): 168 - 176 .
张恒巍 , 李涛 . 基于多阶段攻防信号博弈的最优主动防御 [J ] . 电子学报 , 2017 , 45 ( 2 ): 431 - 439 .
ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game [J ] . Acta Electronica Sinica , 2017 , 45 ( 2 ): 431 - 439 .
HUANG J , ZHANG H , WANG J . Markov evolutionary games for network defense strategy selection [J ] . IEEE Access , 2017 ,PP( 99 ):1.
刘江 , 张红旗 , 刘艺 . 基于不完全信息动态博弈的动态目标防御最优策略选取研究 [J ] . 电子学报 , 2018 , 46 ( 1 ): 82 - 89 .
LIU J , ZHANG H Q , LIU Y . Research on optimal selection of moving target defense policy based on dynamic game with incomplete information [J ] . Acta Electronica Sinica , 2018 , 46 ( 1 ): 82 - 89 .
张恒巍 , 李涛 , 黄世锐 . 基于攻防微分博弈的网络安全防御决策方法 [J ] . 电子学报 , 2018 , 46 ( 6 ): 1428 - 1435 .
ZHANG H W , LI T , HUANG S R . Network defense decision-making method based on attack-defense differential game [J ] . Acta Electronica Sinica , 2018 , 46 ( 6 ): 1428 - 1435 .
SUN Y , XIONG W , YAO Z , et al . Analysis of network attack and defense strategies based on pareto optimum [J ] . Electronics , 2018 , 7 ( 3 ):36.
SEILA A . Simulation and the Monte Carlo method [J ] . Technometrics , 2009 , 24 ( 2 ): 167 - 168 .
RUBINSTEIN R Y , KROESE D P . Simulation and the Monte Carlo method,second edition [M ] . Wiley New York , 2007 .
林要华 , 梁忠 , 胡华平 . 贝塔分布的布谷鸟搜索算法 [J ] . 南京大学学报 , 2016 , 52 ( 4 ): 638 - 646 .
LIN Y H , LIANG Z , HU H P . Cuckoo search algorithm with beta distribution [J ] . Journal of Nanjing University , 2016 , 52 ( 4 ): 638 - 646 .
梅素玉 , 王飞 , 周水庚 . 狄利克雷过程混合模型、扩展模型及应用 [J ] . 科学通报 , 2012 , 57 ( 34 ): 3243 - 3257 .
MEI S Y , WANG F , ZHOU S G . Dirichlet process mixture model,extensions and applications [J ] . Chinese Journal , 2012 , 57 ( 34 ): 3243 - 3257 .
严宇宇 , 陶煜波 , 林海 . 基于层次狄利克雷过程的交互式主题建模 [J ] . 软件学报 , 2016 , 27 ( 5 ): 1114 - 1126 .
YAN Y Y , TAO Y B , LIN H . Interactive topic modeling based on hierarchical Dirichlet process [J ] . Journal of Software , 2016 , 27 ( 5 ): 1114 - 1126 .
常诗雨 , 宋礼鹏 . 基于演化博弈论的网络安全投资策略分析 [J ] . 计算机工程与设计 , 2017 , 38 ( 3 ): 611 - 615 .
CHANG S Y , SONG L P . Analysis of network security investment strategy based on evolutionary game theory [J ] . Computer Engineering& Design , 2017 , 38 ( 3 ): 611 - 615 .
ZHANG S , ZHANG L , QIU K , et al . Variable selection in logistic regression model [J ] . Chinese Journal of Electronics , 2015 , 24 ( 4 ): 813 - 817 .
周靖哲 , 陈长松 . 云计算架构的网络信息安全对策分析 [J ] . 信息网络安全 , 2017 ( 11 ): 74 - 79 .
ZHOU J Z , CHEN C S . Analysis of network information security in the cloud computing architecture [J ] . Netinfo Security , 2017 ( 11 ): 74 - 79 .
0
浏览量
1071
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构