Research on the game of network security attack-defense confrontation through the optimal defense strategy

被引:3
|
作者
Liu, Fei [1 ,2 ]
Gao, Hongyan [1 ]
Wei, Zegang [1 ]
机构
[1] Baoji Univ Arts & Sci, Inst Phys & Optoelect Technol, Baoji 721016, Peoples R China
[2] Baoji Univ Arts & Sci, Adv Titanium Alloys & Funct Coatings Cooperat Inn, Baoji, Peoples R China
来源
SECURITY AND PRIVACY | 2021年 / 4卷 / 01期
关键词
active defense; attack and defense game; Nash equilibrium; network security; optimal defense;
D O I
10.1002/spy2.136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the complication of attack means, the network security technology needs new changes. This study analyzed the establishment of the game model and strategy selection in the process of network security attack and defense confrontation. Firstly, the relevant theory of game theory was introduced; then the network attack and defense game model was established; the components of the model were analyzed; and finally, the Nash equilibrium of the hybrid strategy was solved to obtain the optimal defense strategy. The simulation results showed that the method could find the best attack and defense strategy {a(3), d(4)} in the complex hybrid strategy. The calculation of payoff verified the correctness of the strategy. The experimental results show that the application of the attack-defense confrontation in the network security field is feasible and it can effectively generate optimal attack-defense strategy to realize network security.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Attack-Defense Confrontation Analysis and Optimal Defense Strategy Selection Using Hybrid Game Theoretic Methods
    Jin, Bao
    Zhao, Xiaodong
    Yuan, Dongmei
    [J]. SYMMETRY-BASEL, 2024, 16 (02):
  • [2] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [3] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    [J]. IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [4] Security Analysis for CBTC Systems under Attack-Defense Confrontation
    Wu, Wenhao
    Bu, Bing
    [J]. ELECTRONICS, 2019, 8 (09)
  • [5] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [6] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    [J]. NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [7] Network Security Situation Quantitative Evaluation Based on the Classification of Attacks in Attack-Defense Confrontation Environment
    Yao Shuping
    Gu Yingyan
    [J]. CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 6014 - +
  • [8] An attack-defense game on interdependent networks
    Peng, Rui
    Wu, Di
    Sun, Mengyao
    Wu, Shaomin
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2021, 72 (10) : 2331 - 2341
  • [9] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [10] A Novel Dynamic Method in Distributed Network Attack-Defense Game
    Liu Xiaojian
    Yuan Yuyu
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015