Research on the network security risk control based on game model

被引:0
|
作者
机构
[1] Xia, Fuyun
[2] Che, Tan
[3] Wang, Wangang
来源
Wang, Wangang (wangwg77@163.com) | 1600年 / Universidad Central de Venezuela卷 / 55期
关键词
Algorithm model - Control of networks - Empirical analysis - Generation algorithm - Network administrator - Risk control strategies - Risk controls - Security risk assessments;
D O I
暂无
中图分类号
学科分类号
摘要
This paper provides an optimization trade-off algorithm to study the control of network security risk, and provides a guidance method for network security control. The game model is used to establish the game model of the attacker and the defender in the network security. Based on this model, the optimal risk control strategy generation algorithm is proposed to find the optimal risk control strategy to avoid the network administrator's blindness in the network security risk control Investment, reduce the enterprise in the network security risk control on the loss. The algorithm model is suitable for the network security risk assessment, and the empirical analysis is carried out for the network security. The result shows that the model can get the better scheme, in the state (MS SQL Server, User) and (Mail Server, User), we can get the maximum utility.
引用
收藏
相关论文
共 50 条
  • [41] Research on Agent-Based Coordinated-Control Network Security
    Li, Yong
    Wang, Wenqi
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 3: COMPUTER NETWORKS AND ELECTRONIC ENGINEERING, 2011, 112 : 353 - +
  • [42] Research on Risk Assessment and Strategy Dynamic Attack and Defense Game Based on Twin Model of Power Distribution Network
    Cai, Wenqi
    Yu, Liying
    Yang, Dongsheng
    Zheng, Yan
    2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 684 - 689
  • [43] Edge Network Security Risk Control Based on Attack and Defense Map
    Shi, Lin
    Wang, Zilong
    Zeng, Yixuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (03)
  • [44] Game theory based network control model and its stability analysis
    Li W.
    Bian Z.
    Luo J.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2010, 40 (06): : 1174 - 1179
  • [45] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420
  • [47] Research on Network Defense Graph Model in Network Security
    Qi, Feng
    Xu, Haili
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 23 - 32
  • [48] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [49] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129
  • [50] Research on comprehensive evaluation model of network security based on information entropy
    Zhang, Yi
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 401 - 404