期刊文献+

Security Defence Policy Selection Method Using the Incomplete Information Game Model 被引量:2

Security Defence Policy Selection Method Using the Incomplete Information Game Model
在线阅读 下载PDF
导出
摘要 Nowadays, the network defence policy selection using game model of incomplete information ignores the type of the defender, which quantifies cost simply, resulting in unreasonable defence policies selection. Aiming at the problem, we use Bayesian game theory to model the active defence policy selection. We take the types of both the attacker and the defender into consideration. Besides, the traditional quantization method is enhanced. Then, we calculate the equilibrium of static Bayesian game. Based on the analysis of the equilibrium, we select the optimal defence policy through the prediction for attackers' actions. The paper calculates the defence effectiveness of defence policies and provides a defence policies selection algorithm. Ultimately, we present an example to verify the effectiveness of the method and model proposed in the paper. Nowadays, the network defence policy selection using game model of incomplete information ignores the type of the defender, which quantifies cost simply, resulting in unreasonable defence policies selection. Aiming at the problem, we use Bayesian game theory to model the active defence policy selection. We take the types of both the attacker and the defender into consideration. Besides, the traditional quantization method is enhanced. Then, we calculate the equilibrium of static Bayesian game. Based on the analysis of the equilibrium, we select the optimal defence policy through the prediction for attackers' actions. The paper calculates the defence effectiveness of defence policies and provides a defence policies selection algorithm. Ultimately, we present an example to verify the effectiveness of the method and model proposed in the paper.
出处 《China Communications》 SCIE CSCD 2015年第S2期123-131,共9页 中国通信(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No. 61303074 and No. 61309013 the Henan Province Science and Technology Project Funds under Grant No. 12210231002
关键词 GAME INCOMPLETE information POLICY SELECTION active DEFENCE game incomplete information policy selection active defence
  • 相关文献

参考文献16

  • 1'Information security technology-Baseline for classified protection of information system'. GB/T22239-2008 .
  • 2Liang, Xiannuan,Xiao, Yang.Game Theory for Network Security. Communications Surveys & Tutorials, IEEE . 2013
  • 3Fudenberg D,Tirole J.Game Theory. . 1991
  • 4Myerson,R.'Bayesian equilibrium and incentive compatibility:an introduction.'. Social Goals and Social Organization . 1985
  • 5陈永强,付钰,吴晓平.基于非零和攻防博弈模型的主动防御策略选取方法[J].计算机应用,2013,33(5):1347-1349. 被引量:17
  • 6刘玉岭,冯登国,吴丽辉,连一峰.基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J].软件学报,2012,23(3):712-723. 被引量:34
  • 7Kayode,Alese Boniface,Babatunde,Iwasokun Gabriel,Haruna Danjuma Israel.DGM approach to network attacker and defender policies. Internet Technology and Secured Transactions (ICITST) 2013 8th International Conference for Digital Object . 2013
  • 8Gibbons R.A Primer in Game Theory. . 1992
  • 9ZHANG Wei-ying.Game Theory and Information Economics. . 2012
  • 10林旺群,王慧,刘家红,邓镭,李爱平,吴泉源,贾焰.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316. 被引量:63

二级参考文献70

共引文献212

同被引文献24

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部