Netinfo Security ›› 2024, Vol. 24 ›› Issue (4): 614-625.doi: 10.3969/j.issn.1671-1122.2024.04.011

Previous Articles     Next Articles

A Non-Cooperative Game Model for Optimizing EFIS Data Source Defense Deployment

GU Zhaojun1, ZHANG Yinuo1,2, YANG Xueying1,2, SUI He3()   

  1. 1. Information Security Evaluation Center, Civil Aviation University of China, Tianjin 300300, China
    2. College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
    3. College of Aeronautical Engineering, Civil Aviation University of China, Tianjin 300300, China
  • Received:2024-01-29 Online:2024-04-10 Published:2024-05-16

Abstract:

The Electronic Flight Instrument System (EFIS), characterized by high safety requirements and an extreme operating environment, faces severe limitations in the allocation of defense strategy resources. The lack of a rational defense strategy deployment can significantly impact the overall security of the system. This paper proposed a limited defense strategy deployment optimization model in conjunction with the periodic maintenance of EFIS, drawing on the perspectives of attack-defense decision-making and non-cooperative game theory within the integrated framework of security considerations. The methodology began by establishing a dual-attribute Attack Defense Tree (ADT) to construct the space of attack-defense strategies. Subsequently, employing the perspective transformation approach, a non-cooperative game analysis was conducted from the attacker’s viewpoint to reveal the distribution of attack strategies intending to compromise system security. Finally, based on the results of the attacker’s game results, a game analysis was performed for defense strategies. The feasibility of enhancing the security attributes of defender strategies is validated, providing a reliable theoretical foundation for the allocation of security resources. The model successfully addresses the defense strategy deployment problem under non-cooperative games using Monte Carlo simulation. The optimized deployment scheme for defense strategies, maximizing the expected utility, is obtained. This approach avoids redundant additions of defense measures, effectively enhancing the overall security of the system.

Key words: EFIS, defense strategy deployment, ADT, non-cooperative game, Monte Carlo simulation

CLC Number: