浏览全部资源
扫码关注微信
信息工程大学三院,河南 郑州450001
[ "张恒巍(1978-),男,河南洛阳人,博士,信息工程大学讲师,主要研究方向为网络安全行为分析、信息安全风险评估。" ]
[ "余定坤(1991-),男,江西赣州人,信息工程大学硕士生,主要研究方向为信息安全风险评估。" ]
[ "韩继红(1966-),女,山西定襄人,博士,信息工程大学教授、博士生导师,主要研究方向为网络与信息安全、网络协议分析。" ]
[ "王晋东(1966-),男,山西洪桐人,信息工程大学教授,主要研究方向为网络与信息安全、云资源管理。" ]
[ "李涛(1992-),男,甘肃甘谷人,信息工程大学硕士生,主要研究方向为网络安全主动防御。" ]
网络出版日期:2016-05,
纸质出版日期:2016-05-15
移动端阅览
张恒巍, 余定坤, 韩继红, 等. 基于攻防信号博弈模型的防御策略选取方法[J]. 通信学报, 2016,37(5):51-61.
Heng-wei ZHANG, Ding-kun YU, Ji-hong HAN, et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on communications, 2016, 37(5): 51-61.
张恒巍, 余定坤, 韩继红, 等. 基于攻防信号博弈模型的防御策略选取方法[J]. 通信学报, 2016,37(5):51-61. DOI: 11959/j.issn.1000-436x.2016092.
Heng-wei ZHANG, Ding-kun YU, Ji-hong HAN, et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on communications, 2016, 37(5): 51-61. DOI: 11959/j.issn.1000-436x.2016092.
当前基于博弈理论的防御策略选取方法大多采用完全信息或静态博弈模型,为更加符合网络攻防实际,从动态对抗和有限信息的视角对攻防行为进行研究。构建攻防信号博弈模型,对策略量化计算方法进行改进,并提出精炼贝叶斯均衡求解算法。在博弈均衡分析的基础上,设计了最优防御策略选取算法。通过实验验证了模型和算法的有效性,并在分析实验数据的基础上总结了攻防信号博弈的一般性规律,能够指导不同类型防御者的决策。
Currently defense policies selection based on game theory mostly applied either the complete information game model or the static game model.In order to be more in line with the reality of network attack and defense
at-tack-defense behavior was studied by dynamic rivalry and incomplete information.The attack-defense signaling game mode was built
the method to quantify policies was improved and an algorithm to obtain the perfect Bayesian equili-brium was proposed.On the basis of analyzing equilibrium
the algorithm for selecting the optimal defense policy was proposed.The simulation experiment demonstrates that the model and algorithms are feasible and effective.By the expe-rimental data
general rules on signaling attack-defense game are summarized
which can guide defenders of different types to make decisions.
LIANG X N , YANG X . Game theory for network security [J ] . Com-munications Surveys & Tutorials , 2014 , 15 ( 1 ): 472 - 486 .
ZONOUZ S A , KHURANA H , SANDERS W H . RRE:a game- theo-retic intrusion response and recovery engine [J ] . Parallel and Distri-buted Systems , 2014 , 25 ( 2 ): 395 - 406 .
FALLAH M S . A puzzle-based defense strategy against flooding at-tacks using game theory [J ] . Dependable and Secure Computing , 2013 , 67 ( 1 ): 5 - 19 .
姜伟 , 方滨兴 , 田志宏 . 基于攻防随机博弈模型的防御策略选取研究 [J ] . 计算机研究与发展 , 2013 , 47 ( 10 ): 1714 - 1723 .
JIANG W , FANG B X , TIAN Z H . Research on defense strategies selection based on attack-defense stochastic game model [J ] . Jour-nal of Computer Research and Development , 2013 , 47 ( 10 ): 1714 - 1723 .
LYE K , WING J . Game strategies in network security [J ] . International Journal of Information Security , 2015 , 54 ( 1/2 ): 71 - 82 .
WHITE J , PARK J S , KAMHOUA C A , et al . Game theoretic attack analysis in online social network(OSN)services [C ] // The 2014 Inter-national Conference on Social Networks Technology . Los Angeles , c2014 : 1012 - 1019 .
WANG CL , MIAO Q , DAI YQ . Network survivability analysis based on stochastic game model [J ] . Multimedia Information Networking and Security , 2014 , 55 ( 10 ): 199 - 204 .
YU M , LIU C , QIU X L , et al . Modelling and analysis of phishing attack using stochastic game [J ] . Cyberspace Technology , 2013 , 46 ( 3 ): 300 - 305 .
林旺群 , 王慧 , 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究 [J ] . 计算机研究与发展 , 2013 , 48 ( 2 ): 306 - 316 .
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory [J ] . Journal of Computer Research and Development , 2013 , 48 ( 2 ): 306 - 316 .
BURKE D. . Towards a game theory model of information warfare [D ] . Montgomery:Air University , 2013 .
刘玉岭 , 冯登国 , 吴丽辉 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估-ABE方案软件学报 [J ] . 软件学报 , 2013 , 23 ( 3 ): 712 - 723 .
LIU Y L , FENG D G , WU L H . Performance evaluation of worm at-tack and defense strategies based on static Bayesian game [J ] . Journal of Software , 2013 , 23 ( 3 ): 712 - 723 .
GAO X , ZHU Y F . DDoS defense menchanism analysis based on signaling game model [C ] // The 5th International Conference on the Computer Security Institute . San Francisco , c2013 : 414 - 417 .
LIN J Q , LIU P , JING J W . Using signaling games to model the mul-ti-step attack-defense scenarios on confidentiality [J ] . Security Lecture Notes in Computer Science , 2014 , 39 ( 6 ): 118 - 137 .
石乐义 , 姜蓝蓝 , 贾春福 . 蜜罐诱骗防御机理的博弈理论分析 [J ] . 电子与信息学报 , 2012 , 34 ( 6 ): 1420 - 1424 .
SHI L Y , JING L L , JIA C F . A game theoretic analysis for the honey-pot deceptive mechanism [J ] . Journal of Electronics & Information Technology , 2012 , 34 ( 6 ): 1420 - 1424 .
王元卓 , 于建业 , 邱雯 . 网络群体行为的演化博弈模型与分析方法 [J ] . 计算机学报 , 2015 , 38 ( 2 ): 282 - 300 .
WANG Y Z , YU J Y , QIU W . Evolutionary game model and analysis methods for network group behavior [J ] . Chinese Journal of Computers , 2015 , 38 ( 2 ): 282 - 300 .
BABAR S D , PRASAD N R , PRASAD R . Game theoretic modeling of WSN jamming attack and detection mechanism [J ] . Wire Multi-media Communications , 2013 , 6983 ( 6 ): 1 - 5 .
ROY S , ELLIS C , SHIVA S , et al . A survey of game theory as applied to network security [C ] // The 47rd Hawaii International Conference on System Sciences . Washington D C , c2014 : 15 - 24 .
FUDENBERG D , TIROLE J . Game theory [M ] . Boston:Massachu-settes Institute of Technology Press , 2012 .
高志伟 , 姚尧 , 饶飞 , 等 . 基于漏洞严重程度分类的漏洞预测模型 [J ] . 电子学报 , 2014 , 41 ( 9 ): 1785 - 1787 .
GAO Z W , YAO Y , RAO F , et al . Predicting model of vulnerabilities based on the type of vulnerability severity [J ] . Acta Electronica Sinica , 2014 , 41 ( 9 ): 1785 - 1787 .
KAYODE A B , BABATUNDE I G , HARUNA D I . DGM approach to network attacker and defender strategies [C ] // The 19th International Conference for Digital Object . New York , c2014 : 313 - 320 .
GORDON L , LOEB M , LUCYSHYN W , et al . 2014 CSI/FBI com-puter crime and security survey [C ] // The Computer Security Institute . San Francisco , c2014 : 11 - 34 .
SI P , ZHANG Q , YV F R . QoS aware dynamic resource management in heterogeneous mobile cloud computing networks [J ] . China Com-munications , 2014 , 41 ( 5 ): 144 - 159 .
CVSS:national Nulnerability database version 2.5 [EB/OL ] . http://nvd.nis.gov http://nvd.nis.gov .
0
浏览量
1482
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构