全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于随机博弈模型的网络攻防策略选取

, PP. 35-39

Keywords: 网络安全,攻防模型,策略选取,随机博弈,脆弱性

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对网络攻防过程中无法有效应对攻击意图与策略变化的问题,提出一种基于随机博弈模型的网络安全攻防策略选取方法.将网络安全攻防理解为二人随机博弈问题,以主机脆弱性信息为基础,结合主机重要度与防御措施成功率,生成单一安全属性攻防收益值,根据攻防意图对整体攻防收益进行量化.在此基础上,给出攻防均衡策略选取算法.实例分析表明,所研究的模型与算法在攻防策略选取方面合理、可行.

References

[1]  姜伟, 方滨兴, 田志宏, 等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4): 817-827. Jiang Wei, Fang Binxing, Tian Zhihong, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4): 817-827.
[2]  Liu Peng, Zang Wanyu, Yu Meng. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security, 2005, 8(1): 1-41.
[3]  Lye K, Wing J M. Game strategies in network security[C]//Proceedings of the 15th IEEE Computer Security Foundations Workshop. Copenhagen, 2002, 4(1-2): 71-86.
[4]  Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions[J]. Computer Communications, 2008, 31(10): 1934-1944.
[5]  林旺群, 王慧, 刘家红, 等. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011, 48(2): 306-316. Lin Wangqun, Wang Hui, Liu Jiahong, et al. Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
[6]  石进, 郭山清, 陆音, 等. 一种基于攻击图的入侵响应方法[J]. 软件学报, 2009, 19(10): 2746-2753. Shi Jin, Guo Shanqing, Lu Yin, et al. An intrusion response method based on attack graph[J]. Journal of Software, 2009, 19(10): 2746-2753.
[7]  王元卓, 林闯, 程学旗, 等. 基于随机博弈模型的网络攻防量化分析[J]. 计算机学报, 2010, 33(9): 1748-1762. Wang Yuanzhuo, Lin Chuang, Cheng Xueqi, et al. Analysis for network attack-fefense based on stochastic game model[J]. Chinese Journal of Computers, 2010, 33(9): 1748-1762.
[8]  张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007, 30(2): 234-240. Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2): 234-240.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133