Netinfo Security ›› 2022, Vol. 22 ›› Issue (5): 64-74.doi: 10.3969/j.issn.1671-1122.2022.05.008
Previous Articles Next Articles
SUN Pengyu(), TAN Jinglei, LI Chenwei, ZHANG Hengwei
Received:
2022-01-02
Online:
2022-05-10
Published:
2022-06-02
Contact:
SUN Pengyu
E-mail:zzc91292@163.com
CLC Number:
SUN Pengyu, TAN Jinglei, LI Chenwei, ZHANG Hengwei. Network Security Defense Decision-Making Method Based on Time Differential Game[J]. Netinfo Security, 2022, 22(5): 64-74.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2022.05.008
符号 | 名称 | 具体含义 |
---|---|---|
| 攻击回报 | 攻击方控制系统资源获得的回报 |
| 攻击回报系数 | 实施攻击策略造成的危害程度 |
| 时间策略攻击成本 | 实施时间策略所付出的攻击成本 |
| 行为策略攻击成本 | 实施行为策略所付出的攻击成本 |
| 时间策略效用系数 | 单位时间成本所消耗的资源 |
| 防御回报 | 防御方控制系统资源获得的回报 |
| 防御回报系数 | 实施防御策略产生的保护程度 |
| 时间策略防御成本 | 实施时间策略所付出的防御成本 |
| 行为策略防御成本 | 实施行为策略所付出的防御成本 |
| 行为策略效用系数 | 单位执行成本所消耗的资源 |
[1] | WU Zenan, TIAN Liqin, ZHANG Yi, et al. Network Attack and Defense Modeling and System Security Analysis: A Novel Approach Using Stochastic Evolutionary Game Petri Net[EB/OL]. (2021-11-13)[2021-12-30]. https://dl.acm.org/doi/abs/10.1155/2021/4005877. |
[2] | LIU Binbin. Network Security Threat Situation Recognition Based on Attack and Defense Game Model[J]. Journal of Physics: Conference Series, 2021, 2037(1): 120-126. |
[3] | KNAKE R K. Internet Governance in an Age of Cyber Insecurity[M]. New York: Council on Foreign Relations, 2010. |
[4] | YANG Lin, CHEN Shi. Dynamic Defense Technology in Cyberspace[J]. Secrecy Science and Technology, 2020(6): 4-8. |
杨林, 陈实. 网络空间动态防御技术[J]. 保密科学技术, 2020(6): 4-8. | |
[5] | XU Xiaotong, WANG Gaocai, HU Jintian, et al. Study on Stochastic Differential Game Model in Network Attack and Defense[J]. Security and Communication Networks, 2020(6): 1-15. |
[6] |
WANG Wenbo, KWASINSKI A, NIYATO D, et al. Learning for Robust Routing Based on Stochastic Game in Cognitive Radio Networks[J]. IEEE Transactions on Communications, 2018, 66(6): 2588-2602.
doi: 10.1109/TCOMM.2018.2799616 URL |
[7] | SUN Yan, JI Weifeng, WENG Jiang. Selection of Defensive Optimal Strategy for Moving Target Signal Game[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(9): 1510-1520. |
孙岩, 姬伟峰, 翁江. 移动目标信号博弈的防御最优策略选取[J]. 计算机科学与探索, 2020, 14(9): 1510-1520. | |
[8] |
HOSSEINI S. Defense Against Malware Propagation in Complex Heterogeneous Networks[J]. Cluster Computing, 2021, 24(2): 1199-1215.
doi: 10.1007/s10586-020-03181-4 URL |
[9] | PAWLICK J, FARHANG S, ZHU Quanyan. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats[C]// Springer. 2015 International Conference on Decision and Game Theory for Security. Heidelberg: Springer, 2015: 289-308. |
[10] | SUN Wenjun, SU Yang, CAO Zhen. Attack-Defense Game Model for Advanced Persistent Threats with Asymmetric Information[J]. Journal of Computer Applications, 2017, 37(9): 2557-2562. |
孙文君, 苏旸, 曹镇. 非对称信息条件下APT攻防博弈模型[J]. 计算机应用, 2017, 37(9): 2557-2562. | |
[11] | DING Shaohu, QI Ning, GUO Yiwei. Evaluation of Mimic Defense Strategy Based on M-FlipIt Game Model[J]. Journal on Communications, 2020, 41(7): 186-194. |
丁绍虎, 齐宁, 郭义伟. 基于M-FlipIt博弈模型的拟态防御策略评估[J]. 通信学报, 2020, 41(7): 186-194. | |
[12] |
TAN Jinglei, ZHANG Hengwei, ZHANG Hongqi, et al. Optimal Strategy Selection Approach of Moving Target Defense Based on Markov Time Game[J]. Journal on Communications, 2020, 41(1): 42-52.
doi: 10.1111/j.1460-2466.1991.tb02330.x URL |
谭晶磊, 张恒巍, 张红旗, 等. 基于Markov时间博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2020, 41(1): 42-52. | |
[13] | JIN Zhigang, WANG Xinjian, LI Gen, et al. The Generation Method of Network Defense Strategy Combining with Attack Graph and Game Model[J]. Netinfo Security, 2021, 21(1): 1-9. |
金志刚, 王新建, 李根, 等. 融合攻击图和博弈模型的网络防御策略生成方法[J]. 信息网络安全, 2021, 21(1): 1-9. | |
[14] | LIU Xiaohu, ZHANG Hengwei, ZHANG Yuchen, et al. Active Defense Strategy Selection Method Based on Two-Way Signaling Game[J]. Security and Communication Networks, 2019(2): 1-14. |
[15] | LIU Xiaohu, ZHANG Hengwei, MA Junqiang, et al. Research Review of Network Defense Decision-Making Methods Based on Attack and Defense Game[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 1-14. |
刘小虎, 张恒巍, 马军强, 等. 基于攻防博弈的网络防御决策方法研究综述[J]. 网络与信息安全学报, 2022, 8(1): 1-14. | |
[16] |
DIJK M V, JUELS A, OPREA A, et al. FlipIt: The Game of ‘Stealthy Takeover'[J]. Journal of Cryptology, 2013, 26(4): 655-713.
doi: 10.1007/s00145-012-9134-5 URL |
[17] |
ACEMOGLU D, CHERNOZHUKOV V, WERNING I, et al. Optimal Targeted Lockdowns in a Multigroup SIR Model[J]. American Economic Review: Insights, 2021, 3(4): 487-502.
doi: 10.1257/aeri.20200590 URL |
[18] | MENG Qingwei, QIU Mingyang, WANG Gang, et al. Zeroday Virus Transmission Model and Stability Analysis[J]. Journal of Electronics & Information Technology, 2021, 43(7): 1849-1855. |
孟庆微, 仇铭阳, 王刚, 等. 零日病毒传播模型及稳定性分析[J]. 电子与信息学报, 2021, 43(7): 1849-1855. | |
[19] |
DEL REY A M, VARA R C, GONZÁLEZ S R. A Computational Propagation Model for Malware Based on the SIR Classic Model[J]. Neurocomputing, 2021, 484(1): 161-171.
doi: 10.1016/j.neucom.2021.08.149 URL |
[20] | ZHOU Zhining, WANG Binjun. Virus Propagation Model in Ad Hoc Network[J]. Computer Application and Software, 2021, 38(5): 331-336, 343. |
周枝凝, 王斌君. 自组织网络病毒传播模型研究[J]. 计算机应用与软件, 2021, 38(5): 331-336, 343. | |
[21] | FRIESZ T L. Dynamic Optimization and Differential Games[M]. Heidelberg: Springer, 2010. |
[22] | MI Yan, ZHANG Hengwei, HU Hao, et al. Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model[EB/OL]. (2021-08-24)[2021-11-18]. https://www.hindawi.com/journals/scn/2021/5594697/. |
[23] | HARDIK R, POOJA A. A Survey on: Cyber Crime & Information Security[J]. IOSR Journal of Computer Engineering, 2018, 20(1): 30-34. |
[24] | RICHARDSON R, DIRECTOR C S I. CSI Computer Crime and Security Survey[EB/OL]. (2008-01-08)[2021-12-17]. https://www.researchgate.net/publication/313552042_CSI_computer_crime_and_security_survey. |
[25] | SPRINGER P J. Encyclopedia of Cyber Warfare[M]. Santa Barbara: ABC-CLIO, LLC, 2017. |
[1] | JIN Bo, TANG Qianjin, TANG Qianlin. Interpretation of the Top 10 Development Trends of Network Security in 2022 by CCF Computer Security Professional Committee [J]. Netinfo Security, 2022, 22(4): 1-6. |
[2] | BAI Hongpeng, DENG Dongxu, XU Guangquan, ZHOU Dexiang. Research on Intrusion Detection Mechanism Based on Federated Learning [J]. Netinfo Security, 2022, 22(1): 46-54. |
[3] | GU Zhaojun, YAO Feng, DING Lei, SUI He. Network Security Test of Airport Fuel Supply Automatic Control System Based on Semi-physical Object [J]. Netinfo Security, 2021, 21(9): 16-24. |
[4] | ZHAO Xiaolin, ZHAO Bin, ZHAO Jingjing, XUE Jingfeng. Research on Network Security Measurement Method Based on Attack Identification [J]. Netinfo Security, 2021, 21(11): 17-27. |
[5] | WU Jiaming, XIONG Yan, HUANG Wenchao, WU Jianshuang. A Distance-based Fuzzing Mutation Method [J]. Netinfo Security, 2021, 21(10): 63-68. |
[6] | JIN Zhigang, WANG Xinjian, LI Gen, YUE Shunmin. The Generation Method of Network Defense Strategy Combining with Attack Graph and Game Model [J]. Netinfo Security, 2021, 21(1): 1-9. |
[7] | DONG Qiang, LUO Guoming, SHI Hongkui, ZHANG Yongyue. Research on Authentication and Key Agreement Method of IMS-based Mobile Communication Private Network [J]. Netinfo Security, 2021, 21(1): 88-96. |
[8] | LIU Daheng, LI Hongling. Research on QR Code Phishing Detection [J]. Netinfo Security, 2020, 20(9): 42-46. |
[9] | LI Shibin, LI Jing, TANG Gang, LI Yi. Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM [J]. Netinfo Security, 2020, 20(9): 57-61. |
[10] | LAI Jiangliang, HOU Yifan, LU Xuming. Research on Comprehensive Effectiveness Analysis of Network Security System Based on Information Metrics and Loss [J]. Netinfo Security, 2020, 20(8): 81-88. |
[11] | RAN Jinpeng, WANG Xiang, ZHAO Shanghong, GAO Hanghang. Virtual SDN Network Embedding Algorithm Based on Fruit Fly Optimization [J]. Netinfo Security, 2020, 20(6): 65-74. |
[12] | MENG Xiangru, XU Jiang, KANG Qiaoyan, HAN Xiaoyang. Secure Virtual Network Embedding Algorithm Based on Entropy Weight VIKOR [J]. Netinfo Security, 2020, 20(5): 21-28. |
[13] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[14] | JING Tao, WAN Wei. Research on a P2P Network Communication Behavior Analytical Method for Status Migration Attribute-oriented [J]. Netinfo Security, 2020, 20(1): 16-25. |
[15] | Yue QIU. Network Security Risk Analysis and Assessment of Large-scale Sports Events [J]. Netinfo Security, 2019, 19(9): 61-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||