信息网络安全 ›› 2024, Vol. 24 ›› Issue (4): 614-625.doi: 10.3969/j.issn.1671-1122.2024.04.011

• 技术研究 • 上一篇    下一篇

EFIS数据源防御部署优化的非合作博弈模型

顾兆军1, 张一诺1,2, 扬雪影1,2, 隋翯3()   

  1. 1.中国民航大学信息安全测评中心,天津 300300
    2.中国民航大学计算机科学与技术学院,天津 300300
    3.中国民航大学航空工程学院,天津 300300
  • 收稿日期:2024-01-29 出版日期:2024-04-10 发布日期:2024-05-16
  • 通讯作者: 隋翯 hsui@cauc.edu.cn
  • 作者简介:顾兆军(1966—),男,山东,教授,博士,主要研究方向为网络与信息安全|张一诺(1999—),女,甘肃,硕士研究生,主要研究方向为航空电子系统安全|扬雪影(1999—),女,宁夏,硕士研究生,主要研究方向为民航信息系统|隋翯(1987—),男,吉林,讲师,博士,CCF会员,主要研究方向为网络与信息安全、航空电子系统
  • 基金资助:
    国家自然科学基金(U2333201)

A Non-Cooperative Game Model for Optimizing EFIS Data Source Defense Deployment

GU Zhaojun1, ZHANG Yinuo1,2, YANG Xueying1,2, SUI He3()   

  1. 1. Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China
    2. College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
    3. College of Aeronautical Engineering, Civil Aviation University of China, Tianjin 300300, China
  • Received:2024-01-29 Online:2024-04-10 Published:2024-05-16

摘要:

电子飞行仪表系统(Electronic Flight Instrument System,EFIS)具有高安全性要求,其运行环境极端,可供分配的防御策略资源严重受限,缺乏合理性的防御策略部署会影响系统整体安全。文章从攻防决策视角转换和非合作博弈理论出发,在融合安全视角下提出一种伴随EFIS周期性检修的有限防御策略部署优化模型。首先通过建立双属性的攻击防御树(Attack Defense Tree,ADT)构建攻防策略空间;然后运用决策视角转换思想,从攻击者的角度进行非合作博弈分析,揭示攻击者意图降低系统安全性的攻击策略分配;最后基于攻击者博弈结果对防御策略进行博弈分析,并通过验证提高防御者策略安全属性的可行性,为安全资源分配提供可靠的理论基础。该模型基于蒙特卡洛模拟成功求解了非合作博弈下的防御策略部署问题,得到期望效用最大化时的防御策略优化部署方案,避免了防御措施的冗余添加,同时有效提高了系统整体的安全性。

关键词: 电子飞行仪表系统, 防御策略部署, 攻击防御树, 非合作博弈, 蒙特卡洛模拟

Abstract:

The Electronic Flight Instrument System (EFIS), characterized by high safety requirements and an extreme operating environment, faces severe limitations in the allocation of defense strategy resources. The lack of a rational defense strategy deployment can significantly impact the overall security of the system. This paper proposed a limited defense strategy deployment optimization model in conjunction with the periodic maintenance of EFIS, drawing on the perspectives of attack-defense decision-making and non-cooperative game theory within the integrated framework of security considerations. The methodology began by establishing a dual-attribute Attack Defense Tree (ADT) to construct the space of attack-defense strategies. Subsequently, employing the perspective transformation approach, a non-cooperative game analysis was conducted from the attacker’s viewpoint to reveal the distribution of attack strategies intending to compromise system security. Finally, based on the results of the attacker’s game results, a game analysis was performed for defense strategies. The feasibility of enhancing the security attributes of defender strategies is validated, providing a reliable theoretical foundation for the allocation of security resources. The model successfully addresses the defense strategy deployment problem under non-cooperative games using Monte Carlo simulation. The optimized deployment scheme for defense strategies, maximizing the expected utility, is obtained. This approach avoids redundant additions of defense measures, effectively enhancing the overall security of the system.

Key words: EFIS, defense strategy deployment, ADT, non-cooperative game, Monte Carlo simulation

中图分类号: