Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security

被引:0
|
作者
Zhao, Xuhua [1 ]
机构
[1] Center of Information and Technology, Zhuhai City Polytechnic Jiner Road, Xihu Urban Community, Jinwan District, Zhuhai,Guangdong,519090, China
关键词
This study mainly analyzed the theory of the attack- defense game. Firstly; it analyzed the game theory; then established the network attack-defense game model (NADGM); analyzed its replicator dynamics equation; expounded the network security game algorithm; and built the simulation experiment's network system. It was found from the results that the model and algorithm designed in this study could reflect the changes in network security well. It was also found from the analysis of nodes in the network that the number of infected nodes in the network first increased and then decreased. In contrast; the number of recovered nodes increased gradually; and the proportion of the final damaged nodes was about 10%. The experimental results verify that game theory is useful in network security and can be further promoted and applied;
D O I
10.6633/IJNS.20201122(6).19
中图分类号
学科分类号
摘要
引用
收藏
页码:1037 / 1042
相关论文
共 50 条
  • [31] Nash equilibrium strategy and attack-defense game model for naval support base
    Zeng, Bin
    Wang, Rui
    Li, Houpu
    Zhang, Hongqiang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (08): : 2570 - 2580
  • [32] An Attack-Defense Model with Inhomogeneous Resources of the Opponents
    Perevozchikov, A. G.
    Reshetov, V. Yu.
    Yanochkin, I. E.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2018, 58 (01) : 38 - 47
  • [33] Attack-defense differential game to strength allocation strategies generation
    Li, Lingwei
    Xiao, Bing
    Su, Shihong
    Zhang, Haichao
    Wu, Xiwei
    Guo, Yiming
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (06): : 3219 - 3236
  • [34] Attack-defense game for critical infrastructure considering the cascade effect
    Fu Chaoqi
    Gao Yangjun
    Zhong Jilong
    Sun Yun
    Zhang Pengtao
    Wu Tao
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 216
  • [35] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
  • [36] Cooperative attack-defense game of multiple UAVs with asymmetric maneuverability
    Chen C.
    Mo L.
    Zheng D.
    Cheng Z.
    Lin D.
    Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2020, 41 (12):
  • [37] Attack-Defense Game based Security Analysis for Supply Chain System Subject to Change Design
    Zhang, Yun-Long
    Gao, Shan-Shan
    Wang, Yu
    Sun, Xiaoyan
    Li, Qing-Kui
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [38] ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
    Simmons, Chris B.
    Shiva, Sajjan G.
    Bedi, Harkeerat Singh
    Shandilya, Vivek
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 344 - 365
  • [39] Dynamic game model of botnet DDoS attack and defense
    Wang, Yichuan
    Ma, Jianfeng
    Zhang, Liumei
    Ji, Wenjiang
    Lu, Di
    Hei, Xinhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3127 - 3140
  • [40] Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack-Defense Game
    Wang, Wenhao
    Chen, Xingguo
    Li, Yuwei
    Zhu, Cheng
    APPLIED SCIENCES-BASEL, 2024, 14 (20):