Research on the network security risk control based on game model

被引:0
|
作者
机构
[1] Xia, Fuyun
[2] Che, Tan
[3] Wang, Wangang
来源
Wang, Wangang (wangwg77@163.com) | 1600年 / Universidad Central de Venezuela卷 / 55期
关键词
Algorithm model - Control of networks - Empirical analysis - Generation algorithm - Network administrator - Risk control strategies - Risk controls - Security risk assessments;
D O I
暂无
中图分类号
学科分类号
摘要
This paper provides an optimization trade-off algorithm to study the control of network security risk, and provides a guidance method for network security control. The game model is used to establish the game model of the attacker and the defender in the network security. Based on this model, the optimal risk control strategy generation algorithm is proposed to find the optimal risk control strategy to avoid the network administrator's blindness in the network security risk control Investment, reduce the enterprise in the network security risk control on the loss. The algorithm model is suitable for the network security risk assessment, and the empirical analysis is carried out for the network security. The result shows that the model can get the better scheme, in the state (MS SQL Server, User) and (Mail Server, User), we can get the maximum utility.
引用
收藏
相关论文
共 50 条
  • [21] Research on the Effectiveness of Network Negotiation Based on Evolutionary Game Model
    Yang, Yang-Yang
    Xie, Xue-Mei
    IEEE ACCESS, 2020, 8 : 194623 - 194630
  • [22] Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
    Lv, Haitao
    Hu, Ruimin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 146 - 149
  • [23] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [24] Research on Network Security Issues and Security Model
    Tang, JianGang
    Zhang, ShiJun
    Jiang, Ji
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 128 - 131
  • [25] Adaptive access control model of vehicular network big data based on XACML and security risk
    Fan, Hong-Jin (fanhjin@163.com), 1600, Femto Technique Co., Ltd. (22):
  • [26] A game based model of security for key predistribution schemes in wireless sensor network
    Mukhopadhyay, D
    Roy, S
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 334 - 347
  • [27] Danger Theory Based Model for Network Security Risk Assessment
    Sun, Feixian
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 148 - 154
  • [28] Network security risk assessment model based on fuzzy theory
    Yi, Bo
    Cao, Yuan Ping
    Song, Ying
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 3921 - 3928
  • [29] Research on the power control based on game theory in wireless data network
    Communication Research Center, Harbin Institute of Technology, Harbin 150001, China
    Harbin Gongye Daxue Xuebao, 2007, SUPPL. 1 (139-142):
  • [30] Network security evaluation based on stochastic game and network entropy
    Chen, Yong-Qiang
    Wu, Xiao-Ping
    Fu, Yu
    Song, Yan
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2014, 37 (SUPPL.): : 92 - 96