Modeling and Analysis of the Decentralized Interactive Cyber Defense Approach

被引:0
作者
Ming Liu
Ruiguang Li
Weiling Chang
Jieming Gu
Shouying Bai
Jia Cui
Lu Ma
机构
[1] NationalComputerNetworkEmergencyResponseTechnicalTeam/CoordinationCenterofChina
关键词
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Powered by the Internet and the everincreasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collaborative defense technologies.In this paper, we introduced an extended interactive multi-agent decision model for decentralized cyber defense. Based on the significant advantages of the cooperative multi-agent decision-making, the decentralized interactive decision model DI-MDPs and the corresponding interaction and retrieval algorithms are proposed. Then, we analyzed the interactive decision by the calculation and update processes of three matrices,the stability and evolutionary equilibrium of the proposed model are also analyzed. Finally, we evaluated the performance of the proposed algorithms based on open data sets and standard test environments, the experimental results shown that the proposed work will be more applicable in cyber defense.
引用
收藏
页码:116 / 128
页数:13
相关论文
共 17 条
[1]  
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method[J]. Shilian Zheng,Linhui Ye,Xuanye Wang,Jinyin Chen,Huaji Zhou,Caiyi Lou,Zhijin Zhao,Xiaoniu Yang.China Communications. 2021(12)
[2]   Multi-Agent Reinforcement Learning for Resource Allocation in Io T Networks with Edge Computing [J].
Xiaolan Liu ;
Jiadong Yu ;
Zhiyong Feng ;
Yue Gao .
中国通信, 2020, 17 (09) :220-236
[3]  
Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network[J] . Omer Elsier Tayfour,Muhammad Nadzir Marsono.Mobile Networks and Applications . 2020 (prep)
[4]  
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems[J] . Linan Huang,Quanyan Zhu.Computers & Security . 2020 (C)
[5]  
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense[J] . Cho Jin Hee,Sharma Dilli P.,Alavizadeh Hooman,Yoon Seunghyun,Ben Asher Noam,Moore Terrence J.,Kim Dong Seong,Lim Hyuk,Nelson Frederica F..IEEE Communications Surveys & Tutorials . 2020 (1)
[6]   A Survey of Network Attacks on Cyber-Physical Systems [J].
Cao, Liwei ;
Jiang, Xiaoning ;
Zhao, Yumei ;
Wang, Shouguang ;
You, Dan ;
Xu, Xianli .
IEEE ACCESS, 2020, 8 :44219-44227
[7]  
Practical k-agents search algorithm towards information retrieval in complex networks[J] . Pengfei Liu,Minyu Feng,Ming Liu.World Wide Web . 2019 (2)
[8]   Safety Analysis of AADL Models for Grid Cyber-Physical Systems via Model Checking of Stochastic Games [J].
Wei, Xiaomin ;
Dong, Yunwei ;
Sun, Pengpeng ;
Xiao, Mingrui .
ELECTRONICS, 2019, 8 (02)
[9]  
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats[J] . Ibrahim Ghafir,Konstantinos G. Kyriakopoulos,Sangarapillai Lambotharan,Francisco J. Aparicio-Navarro,Basil AsSadhan,Hamad Binsalleeh,Diab M. Diab.IEEE Access . 2019
[10]  
Detection of advanced persistent threat using machine-learning correlation analysis[J] . Ibrahim Ghafir,Mohammad Hammoudeh,Vaclav Prenosil,Liangxiu Han,Robert Hegarty,Khaled Rabie,Francisco J. Aparicio-Navarro.Future Generation Computer Systems . 2018