Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory

被引:18
|
作者
Shi, Leyi [1 ,2 ,3 ]
Wang, Xiran [2 ]
Hou, Huiwen [2 ]
机构
[1] China Univ Petr, Coll Oceanog & Space Informat, Qingdao 266580, Peoples R China
[2] China Univ Petr, Coll Comp Sci & Technol, Qingdao 266580, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
evolutionary game theory; array honeypot; multi-party game; bounded rationality; evolutionarily stable strategy; proactive defense; dynamic honeypot; STABLE STRATEGIES;
D O I
10.3390/math9080805
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a "passive" active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Research on Offense and Defense of DDos Based on Evolutionary Game Theory
    Zhao, Tengteng
    Zhang, Wei
    Li, Xiaolong
    Wang, Wenjing
    Niu, Xu
    Guo, Hui
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 3 - 15
  • [2] Generation of security system defense strategies based on evolutionary game theory
    Zou, Bowen
    Wang, Yongdong
    Liu, Chunqiang
    Dai, Mingguang
    Du, Qianwen
    Zhu, Xiang
    NUCLEAR ENGINEERING AND TECHNOLOGY, 2024, 56 (09) : 3463 - 3471
  • [3] A generic approach for network defense strategies generation based on evolutionary game theory
    Liu, Liang
    Tang, Chuhao
    Zhang, Lei
    Liao, Shan
    INFORMATION SCIENCES, 2024, 677
  • [4] Research on Renewable Energy Trading Strategies Based on Evolutionary Game Theory
    Huang, Fei
    Fan, Hua
    Shang, Yunlong
    Wei, Yuankang
    Almutairi, Sulaiman Z.
    Alharbi, Abdullah M.
    Ma, Hengrui
    Wang, Hongxia
    SUSTAINABILITY, 2024, 16 (07)
  • [5] Incumbents' defense strategies: a comparison of deterrence and shakeout strategy based on evolutionary game theory
    Homburg, Christian
    Fuerst, Andreas
    Ehrmann, Thomas
    Scheinker, Eugen
    JOURNAL OF THE ACADEMY OF MARKETING SCIENCE, 2013, 41 (02) : 185 - 205
  • [6] Incumbents’ defense strategies: a comparison of deterrence and shakeout strategy based on evolutionary game theory
    Christian Homburg
    Andreas Fürst
    Thomas Ehrmann
    Eugen Scheinker
    Journal of the Academy of Marketing Science, 2013, 41 : 185 - 205
  • [7] Game analysis and decision making optimization of evolutionary dynamic honeypot
    Wang, Xiran
    Shi, Leyi
    Cao, Chi
    Wu, Weixin
    Zhao, Zhihao
    Wang, Ye
    Wang, Kai
    Computers and Electrical Engineering, 2024, 119
  • [8] Research on dynamic array honeypot for collaborative network defense strategy
    Shi, Le-Yi
    Li, Jie
    Liu, Xin
    Jia, Chun-Fu
    Tongxin Xuebao/Journal on Communications, 2012, 33 (11): : 159 - 164
  • [9] Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
    Song, Lihua
    Jiang, Yangyang
    Xing, Changyou
    Zhang, Guomin
    Tongxin Xuebao/Journal on Communications, 2022, 43 (11): : 104 - 116
  • [10] A Method for Selecting Defense Strategies Based on Stochastic Evolutionary Game Model
    Huang J.-M.
    Zhang H.-W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (09): : 2222 - 2228