Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security

被引:0
|
作者
Zhao, Xuhua [1 ]
机构
[1] Center of Information and Technology, Zhuhai City Polytechnic Jiner Road, Xihu Urban Community, Jinwan District, Zhuhai,Guangdong,519090, China
关键词
This study mainly analyzed the theory of the attack- defense game. Firstly; it analyzed the game theory; then established the network attack-defense game model (NADGM); analyzed its replicator dynamics equation; expounded the network security game algorithm; and built the simulation experiment's network system. It was found from the results that the model and algorithm designed in this study could reflect the changes in network security well. It was also found from the analysis of nodes in the network that the number of infected nodes in the network first increased and then decreased. In contrast; the number of recovered nodes increased gradually; and the proportion of the final damaged nodes was about 10%. The experimental results verify that game theory is useful in network security and can be further promoted and applied;
D O I
10.6633/IJNS.20201122(6).19
中图分类号
学科分类号
摘要
引用
收藏
页码:1037 / 1042
相关论文
共 50 条
  • [11] A probabilistic automata-based network attack-defense game model for data security by using security service chain
    Hao Liu
    Chong Wang
    Zhonghai Wu
    World Wide Web, 2025, 28 (1)
  • [12] Research on Optimization Model of Network Attack Defense Game
    Yang, Sun
    Wei, Xiong
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 426 - 429
  • [13] Research on Network Attack-Defense Simulation Training Platform
    Lin, ZhiWei
    Chen, Gang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [14] Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets
    Wang, Yuanzhuo
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 89 - 99
  • [15] Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game
    Jia, Zhi-Xiang
    Kiang, Jean-Fu
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [16] Multilayered Attack-Defense Model on Networks
    Perevozchikov, A. G.
    Reshetov, V. Yu
    Yanochkin, I. E.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2019, 59 (08) : 1389 - 1397
  • [17] Analysis Method based on Rough Attack-defense Bayes Game Model
    Zhang, Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 109 - 118
  • [18] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [19] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [20] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87