Risk Assessment of UAV Cyber Range Based on Bayesian-Nash Equilibrium

被引:0
作者
Miao, Shangting [1 ]
Pan, Quan [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Peoples R China
[2] Northwestern Polytech Univ, Sch Automat, Xian 710129, Peoples R China
关键词
Bayesian-Nash equilibrium; UAV cyber range; risk assessment; DRONE FORENSICS; SECURITY; SYSTEMS;
D O I
10.3390/drones8100556
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
In order to analyze the choice of the optimal strategy of cyber security attack and defense in the unmanned aerial vehicles' (UAVs) cyber range, a game model-based UAV cyber range risk assessment method is constructed. Through the attack and defense tree model, the risk assessment method is calculated. The model of attack and defense game with incomplete information is established and the Bayesian-Nash equilibrium of mixed strategy is calculated. The model and method focus on the mutual influence of the actions of both sides and the dynamic change in the confrontation process. According to the calculation methods of different benefits of different strategies selected in the offensive and defensive game, the risk assessment and calculation of the UAV cyber range are carried out based on the probability distribution of the defender's benefits and the attacker's optimal strategy selection. An example is given to prove the feasibility and effectiveness of this method.
引用
收藏
页数:25
相关论文
共 50 条
  • [31] DECISION SUPPORT BASED ON THE RISK ASSESSMENT OF INFORMATION SYSTEMS AND BAYESIAN LEARNING
    Ocevcic, Hrvoje
    Nenadic, Kresimir
    Solic, Kresimir
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2014, 21 (03): : 539 - 544
  • [32] A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network
    Wang, Jiao
    Fan, Kefeng
    Mo, Wei
    Xu, Dongyang
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 279 - 283
  • [33] Deep charging effect risk model assessment based on Bayesian methods
    Li Cheng
    Chen Dong
    CHINESE JOURNAL OF GEOPHYSICS-CHINESE EDITION, 2019, 62 (06): : 1991 - 2000
  • [34] METHOD FOR QUANTITATIVE RISK ASSESSMENT OF CYBER-PHYSICAL SYSTEMS BASED ON VULNERABILITY ANALYSIS
    Alguliyev, Rasim
    Aliguliyev, Ramiz
    Sukhostat, Lyudmila
    KYBERNETIKA, 2024, 60 (06) : 779 - 796
  • [35] CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
    Doynikova, Elena
    Kotenko, Igor
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 346 - 353
  • [36] Improved Bayesian Network-Based Risk Model and Its Application in Disaster Risk Assessment
    Ming Li
    Mei Hong
    Ren Zhang
    International Journal of Disaster Risk Science, 2018, 9 : 237 - 248
  • [37] Improved Bayesian Network-Based Risk Model and Its Application in Disaster Risk Assessment
    Li, Ming
    Hong, Mei
    Zhang, Ren
    INTERNATIONAL JOURNAL OF DISASTER RISK SCIENCE, 2018, 9 (02) : 237 - 248
  • [38] Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering
    Gao, Haihui
    Dai, Zhonghua
    Peng, Yong
    Lu, Huikang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 524 - 527
  • [39] Improved Bayesian Network-Based Risk Model and Its Application in Disaster Risk Assessment
    Ming Li
    Mei Hong
    Ren Zhang
    International Journal of Disaster Risk Science, 2018, 9 (02) : 237 - 248
  • [40] Enhancing UAV Flight Safety through Sensor-based Runtime Risk Assessment
    Lim, Yong Zhi
    Xin, Xin
    Khoo, Teck Ping
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,