Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search

被引:0
|
作者
Sun Q. [1 ,2 ]
Xue L. [2 ]
Gao L. [2 ,3 ]
Wang H. [2 ]
Wang Y. [1 ]
机构
[1] Contemporary Educational Technology Center, Northwest University, Xi'an
[2] State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services, School of Information Science and Technology, Northwest University, Xi'an
[3] State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services, College of Computer Science, Xi'an Polytechnic University, Xi'an
来源
Xue, Leiqi (201832066@stumail.nwu.edu.cn) | 1600年 / Science Press卷 / 57期
基金
中国国家自然科学基金;
关键词
Bounded rationality; Defense strategy; Network attack and defense; Stochastic game; Tabu search;
D O I
10.7544/issn1000-1239.2020.20190870
中图分类号
学科分类号
摘要
The network defence strategy is the key factor to determine the effect of network security protection. In terms of the rational precondition of the existing network defence decision-making research and the parameter selection of the attack and defence benefit function, there are model deviations for the factors such as information asymmetry and legal punishment in the actual network attack and defence, which reduces the practicability and reliability of the strategy. In this paper, the Tabu random game model is constructed on the basis of the preconditions of bounded rationality, the Tabu search algorithm is introduced to analyze the bounded rationality of random game, and a search algorithm with memory function is designed. The data structure of the Tabu table is used to realize the memory function, and the data-driven memory combined with the game model is used to get the optimal defence strategy. The experimental results show that this method improves the accuracy in the quantification of attack and defence benefits, improves the accuracy of defence benefits compared with the existing typical methods, and the algorithm space complexity is better than the reinforcement learning and other typical algorithms. © 2020, Science Press. All right reserved.
引用
收藏
页码:767 / 777
页数:10
相关论文
共 20 条
  • [1] Hu H., Zhang H., Liu Y., Et al., Quantitative method for network security situation based on attack prediction, Security and Communication Networks, 2017, 7, pp. 1-19, (2017)
  • [2] Wang Y., Lin C., Cheng X., Et al., Analysis for network attack-dense based on stochastic game model, Chinese Journal of Computers, 33, 9, pp. 1748-1762, (2010)
  • [3] Lin W., Wang H., Liu J., Et al., Research on active defense technology in network security based on non-cooperative dynamic game theory, Journal of Computer Research and Development, 48, 2, pp. 306-316, (2011)
  • [4] Kendall, Graham, John, Et al., Computing Nash equilibria and evolutionarily stable states of evolutionary games, IEEE Transactions on Evolutionary Computation, 20, 3, pp. 460-469, (2016)
  • [5] Cheng L., Zhang H., Wang L., Et al., Incomplete information Markov game theoretic approach to strategy generation for moving target defense, Computer Communications, 116, 12, pp. 184-199, (2018)
  • [6] Huang J., Zhang H., Selection method of network defense strategy based on stochastic evolutionary game model, Acta Electronica Sinica, 46, 9, pp. 2222-2228, (2018)
  • [7] Zhang H., Li T., Optimal active defense based on multi-stage attack-defense signaling game, Acta Electronica Sinica, 45, 2, pp. 431-439, (2017)
  • [8] Jiang W., Fang B., Tian Z., Et al., Research on defense strategies selection based on attack-defense stochastic game model, Journal of Computer Research and Development, 47, 10, pp. 1714-1723, (2010)
  • [9] White J., Park J.S., Kamhoua C.A., Et al., Game theoretic attack analysis in online social network (OSN) services, Proc of the 2013 IEEE/ACM Int Conf on Advances in Social Networks Analysis and Mining, pp. 1012-1019, (2013)
  • [10] Hofbauer J., Sigmund K., Evolutionary game dynamics, Bulletin (New Series) of the American Mathematical Society, 40, 4, pp. 479-519, (2011)