Network Attack Defense Awareness based on Dynamic Game

被引:0
|
作者
Li, Man [1 ]
Cao, Jinjing [1 ]
机构
[1] Shandong Huayu Univ Technol, Dezhou 253034, Shandong, Peoples R China
关键词
Network Security; Attack Model; Attack and Defense Strategy; Game Theory;
D O I
10.14257/ijsia.2015.9.7.06
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By defining attack-defense action sequence and utility function of both sides, combine with dynamic Bayes game theory to analyze the confrontation and interdependence between the two agents' strategies. Dynamic Bayes attack-defense game model can describe each possible strategy in every stage. This paper proposes the construction method of game extensive form by utilizing attack-defense confrontation model, and presents the equilibrium strategy solution algorithm.
引用
收藏
页码:69 / 77
页数:9
相关论文
共 50 条
  • [21] Attack and Defense Strategies in Complex Networks Based on Game Theory
    LI Yapeng
    DENG Ye
    XIAO Yu
    WU Jun
    JournalofSystemsScience&Complexity, 2019, 32 (06) : 1630 - 1640
  • [22] Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm
    Jin, Hui
    Zhang, Senlei
    Zhang, Bin
    Dong, Shuqin
    Liu, Xiaohu
    Zhang, Hengwei
    Tan, Jinglei
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (03) : 292 - 302
  • [23] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [24] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [25] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [26] Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes
    Wang, Shuliang
    Sun, Jingya
    Zhang, Jianhua
    Dong, Qiqi
    Gu, Xifeng
    Chen, Chen
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 40
  • [27] Cyberspace attack and defense game based on reward randomization reinforcement learning
    Zhang, Lei
    Li, Hongmei
    Pan, Yu
    Zheng, Qibin
    Li, Wei
    Liu, Yi
    ARRAY, 2022, 16
  • [28] Network Defense Strategy Selection Based on Best-response Dynamic Evolutionary Game Model
    Huang, Jian-ming
    Wang, Jin-dong
    Zhang, Heng-wei
    Wang, Na
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2611 - 2615
  • [29] Network Defense Decision-Making Based on Deep Reinforcement Learning and Dynamic Game Theory
    Huang Wanwei
    Yuan Bo
    Wang Sunan
    Ding Yi
    Li Yuhua
    ChinaCommunications, 2024, 21 (09) : 262 - 275
  • [30] Network Defense Decision-Making Based on Deep Reinforcement Learning and Dynamic Game Theory
    Huang, Wanwei
    Yuan, Bo
    Wang, Sunan
    Ding, Yi
    Li, Yuhua
    CHINA COMMUNICATIONS, 2024, 21 (09) : 262 - 275