Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security

被引:0
|
作者
Zhao, Xuhua [1 ]
机构
[1] Center of Information and Technology, Zhuhai City Polytechnic Jiner Road, Xihu Urban Community, Jinwan District, Zhuhai,Guangdong,519090, China
关键词
This study mainly analyzed the theory of the attack- defense game. Firstly; it analyzed the game theory; then established the network attack-defense game model (NADGM); analyzed its replicator dynamics equation; expounded the network security game algorithm; and built the simulation experiment's network system. It was found from the results that the model and algorithm designed in this study could reflect the changes in network security well. It was also found from the analysis of nodes in the network that the number of infected nodes in the network first increased and then decreased. In contrast; the number of recovered nodes increased gradually; and the proportion of the final damaged nodes was about 10%. The experimental results verify that game theory is useful in network security and can be further promoted and applied;
D O I
10.6633/IJNS.20201122(6).19
中图分类号
学科分类号
摘要
引用
收藏
页码:1037 / 1042
相关论文
共 50 条
  • [21] An attack-defense game model in infrastructure networks under link hiding
    Qi, Gaoxin
    Li, Jichao
    Xu, Xueming
    Chen, Gang
    Yang, Kewei
    CHAOS, 2022, 32 (11)
  • [22] Attack-Defense Game in Interdependent Networks: A Functional Perspective
    Sun, Jingya
    Wang, Shuliang
    Zhang, Jianhua
    Dong, Qiqi
    JOURNAL OF INFRASTRUCTURE SYSTEMS, 2023, 29 (03)
  • [23] Security risk assessment of projects in high-risk areas based on attack-defense game model
    Yao, Yifan
    Chen, Wenjing
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [24] Security risk assessment of projects in high-risk areas based on attack-defense game model
    Yifan Yao
    Wenjing Chen
    Scientific Reports, 13
  • [25] A quantifiable Attack-Defense Trees model for APT attack
    Fei, Yu
    Ning, Jing
    Jiang, Wenbao
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2303 - 2306
  • [26] Attack-Defense Utility Quantification And Security Risk Assessment
    Yang, Su
    Wu, Chensi
    Xie, Weiqiang
    Wang, Wenjie
    Zhang, Yuqing
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1456 - 1461
  • [27] Adaptive attack occupancy maneuver decision of UUV attack-defense game
    Wang, Zhao
    Wang, Hong-Jian
    Zhang, Hong-Han
    Yu, Dan
    Ren, Jing-Fei
    Kongzhi yu Juece/Control and Decision, 2024, 39 (11): : 3819 - 3828
  • [28] Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
    He, Sui
    Lei, Ding
    Shuang, Wang
    Liu, Chunbo
    Gu, Zhaojun
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 651 - 655
  • [29] Network Attack Defense Awareness based on Dynamic Game
    Li, Man
    Cao, Jinjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 69 - 77
  • [30] Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes
    Wang, Shuliang
    Sun, Jingya
    Zhang, Jianhua
    Dong, Qiqi
    Gu, Xifeng
    Chen, Chen
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 40