Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory

被引:18
|
作者
Shi, Leyi [1 ,2 ,3 ]
Wang, Xiran [2 ]
Hou, Huiwen [2 ]
机构
[1] China Univ Petr, Coll Oceanog & Space Informat, Qingdao 266580, Peoples R China
[2] China Univ Petr, Coll Comp Sci & Technol, Qingdao 266580, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
evolutionary game theory; array honeypot; multi-party game; bounded rationality; evolutionarily stable strategy; proactive defense; dynamic honeypot; STABLE STRATEGIES;
D O I
10.3390/math9080805
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a "passive" active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.
引用
收藏
页数:21
相关论文
共 50 条
  • [11] Attack and Defense Strategies in Complex Networks Based on Game Theory
    LI Yapeng
    DENG Ye
    XIAO Yu
    WU Jun
    JournalofSystemsScience&Complexity, 2019, 32 (06) : 1630 - 1640
  • [12] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Yapeng Li
    Ye Deng
    Yu Xiao
    Jun Wu
    Journal of Systems Science and Complexity, 2019, 32 : 1630 - 1640
  • [13] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Li, Yapeng
    Deng, Ye
    Xiao, Yu
    Wu, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2019, 32 (06) : 1630 - 1640
  • [14] Defense Strategy Selection Model Based on Multistage Evolutionary Game Theory
    Liu Y.
    Chen H.
    Zhang H.
    Liu X.
    Security and Communication Networks, 2021, 2021
  • [15] Honeypot-based Defense System Research and Design
    Zhang Li-juan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
  • [16] A Learning-based Honeypot Game for Collaborative Defense in UAV Networks
    Wang, Yuntao
    Su, Zhou
    Benslimane, Abderrahim
    Xu, Qichao
    Dai, Minghui
    Li, Ruidong
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3521 - 3526
  • [17] Evolutionary Strategies for Advanced Array Optimization
    Oliveri, G.
    Rocca, P.
    Poli, L.
    Carlin, M.
    Bekele, E. T.
    De Matteis, A.
    Massa, A.
    2011 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION (APSURSI), 2011, : 2441 - 2444
  • [18] A novel optimization approach based on unstructured evolutionary game theory
    Escobar-Curves, Hector
    Cuevas, Erik
    Galvez, Jorge G.
    Toski, Miguel
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2024, 219 : 454 - 472
  • [19] Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory
    Qiu, Yihui
    Chen, Zhide
    Xu, Li
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [20] Research of Telecommunications access pricing based on Evolutionary game theory
    Li, Nan
    FRONTIERS OF ADVANCED MATERIALS AND ENGINEERING TECHNOLOGY, PTS 1-3, 2012, 430-432 : 1091 - 1094