全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于随机博弈与网络熵的网络安全性评估

, PP. 92-96

Keywords: 网络安全,网络熵,随机博弈,对抗模型,入侵效果

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种网络熵和随机博弈相结合的网络安全性评估方法.基于随机博弈构建了多人、多状态的网络对抗随机博弈模型.引入网络熵描述网络安全性能,通过求解模型的Nash均衡解获得最优防御策略和网络状态概率,进而利用网络状态熵差对网络安全性进行评估;最后给出了网络安全性评估算法.实例分析表明,该方法能有效评估网络安全性能,为主动防御提供决策支持.

References

[1]  Kumar K, Joshir C, Singh K. A distributed approach using entropy to detect DDoS attacks in ISP domain[C]// International Conference on Signal Processing, Communications and Networking. New York: IEEE Press, 2007: 331-337.
[2]  汤永利, 徐国爱, 钮心忻,等. 基于信息熵的信息安全风险分析模型[J]. 北京邮电大学学报, 2008, 31(2): 50-53. Tang Yongli, Xu Guoai, Niu Xinxin,et al. Information security risk analysis model using information entropy[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(2): 50-53.
[3]  陈娟, 马涛. 移动Ad Hoc网络DoS攻击效果评估方法[J]. 电光与控制, 2012, 19(3): 86-89. Chen Juan, Ma Tao. DoS attack effect assessment method in mobile Ad Hoc network [J]. Electronics Optics & Control, 2012, 19(3): 86-89.
[4]  吴焕, 潘林, 王晓箴,等. 应用不完整攻击图分析的风险评估模型[J]. 北京邮电大学学报, 2010, 33(3): 57-61. Wu Huan, Pan Lin, Wang Xiaozhen,et al. A risk assessment model using incomplete attack graphs analysis[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 57-61
[5]  刘玉玲, 冯登国, 吴丽辉, 等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012, 23(3):712-723. Liu Yuling, Feng Dengguo, Wu Lihui, et al. Performance evaluation of worm attack and defense strategies based on static bayesian game[J]. Journal of Software, 2012, 23(3):712-723
[6]  王元卓, 林闯, 程学旗, 等. 基于随机博弈模型的网络攻防量化分析[J]. 计算机学报, 2010, 33(9): 1748-1762. Wang Yuanzhuo, Lin Chuang, Cheng Xueqi, et al. Analysis for Network Attack-Defense Based on Stochastic Game Model[J]. Chinese Journal of Computers. 2010, 33(9): 1748-1762.
[7]  叶云, 徐锡山, 贾焰, 等. 基于攻击图的网络安全概率计算方法[J]. 计算机学报, 2010, 33(10): 1987-1996. Ye Yun, Xu Xishan, Jia Yan, et al. An attack graph-based probabilistic computing approach of network security[J]. Chinese Journal of Computers, 2010, 33(10): 1987-1996.
[8]  吴迪, 冯登国, 连一峰, 等. 一种给定脆弱性环境下的安全措施效用评估模型[J]. 软件学报, 2012, 23(7): 1880-1898. Wu Di, Feng Dengguo, Lian Yifeng, et al. Efficiency evaluation model of system security measures in the given vulnerabilities set[J]. Journal of Software, 2012, 23(7): 1880-1898.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133