Security Defense Policy Selection Method Using the Incomplete Information Game Model

被引:0
作者
Zhang Hengwei [1 ]
Yu Dingkun [1 ]
Wang Jindong [1 ]
Han Jihong [1 ]
Wang Na [1 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
game; incomplete information; policy selection; active defence;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, the network defence policy selection using game model of incomplete information ignores the type of the defender, which quantifies cost simply, resulting in unreasonable defence policies selection. Aiming at the problem, we use Bayesian game theory to model the active defence policy selection. We take the types of both the attacker and the defender into consideration. Besides, the traditional quantization method is enhanced. Then, we calculate the equilibrium of static Bayesian game. Based on the analysis of the equilibrium, we select the optimal defence policy through the prediction for attackers' actions. The paper calculates the defence effectiveness of defence policies and provides a defence policies selection algorithm. Ultimately, we present an example to verify the effectiveness of the method and model proposed in the paper.
引用
收藏
页码:123 / 131
页数:9
相关论文
共 16 条
[1]  
[Anonymous], GBT222392008
[2]  
[Anonymous], 1992, PRIMER GAME THEORY
[3]  
[陈永强 Chen Yongqiang], 2013, [计算机应用, Journal of Computer Applications], V33, P1347
[4]  
Fudenberg D., 1991, Game Theory
[5]  
[姜伟 JIANG Wei], 2009, [计算机学报, Chinese Journal of Computers], V32, P817
[6]  
Kayode Alese Boniface, 2013, INT TECHN SEC T ICIT, p313
[7]   Game Theory for Network Security [J].
Liang, Xiannuan ;
Xiao, Yang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :472-486
[8]  
[林旺群 Lin Wangqun], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P306
[9]  
Liu P., 2005, ACM T INFORM SYSTEM
[10]  
Liu Y., 2006, GAMENETS 06, P4, DOI [10.1145/1190195.1190198, DOI 10.1145/1190195.1190198]