Network Security Situation Assessment Based on Stochastic Game Model

被引:0
作者
Zhang, Boyun [1 ,2 ]
Chen, Zhigang [2 ]
Tang, Wensheng [4 ]
Fan, Qiang [1 ]
Yan, Xiai [1 ]
Wang, Shulin [3 ]
机构
[1] Hunan Police Acad, Dept Comp Sci & Technol, Changsha 410138, Hunan, Peoples R China
[2] Cent S Univ, Sch Informat Sci & Engn, Changsha 410138, Hunan, Peoples R China
[3] Hunan Univ, Sch Comp & Commun, Changsha 410082, Hunan, Peoples R China
[4] Hunan Univ, Dept Comp Teach, Changsha 410081, Hunan, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING | 2011年 / 6838卷
基金
中国国家自然科学基金;
关键词
network security; network security situation assessment; stochastic game theory; risk evaluation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
From the perspective of game theory, this paper studies the information security problem, establishes an offense and defense game model of information security, and puts forward a quantitative evaluation algorithm of network security based on stochastic game model. It makes use of the network administrator's evaluation of network equipment's importance to determine the game parameters, analyze Nash equilibrium and work out Nash strategy of the attacker and the defender so as to obtain the probability distribution when network is in different secure states and finally get the evaluation results of network security situation through quantitative analysis. The game model of the attacker and the defender put forward in this paper provides a new idea for solving information security problem in reality.
引用
收藏
页码:517 / +
页数:3
相关论文
共 50 条
[41]   A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional GRU [J].
Zhang, Shengcai ;
Fu, Qiming ;
An, Dezhi ;
He, Zhenxiang ;
Liu, Zhenyu .
PEERJ COMPUTER SCIENCE, 2023, 9
[42]   A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional GRU [J].
Zhang, Shengcai ;
Fu, Qiming ;
An, Dezhi ;
He, Zhenxiang ;
Liu, Zhenyu .
PEERJ, 2023, 11
[43]   A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional GRU [J].
Zhang S. ;
Fu Q. ;
An D. ;
He Z. ;
Liu Z. .
PeerJ Computer Science, 2023, 9
[44]   Method for assessment of network security situation with deep learning [J].
Yang H. ;
Zeng R. .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01) :183-190
[45]   Multi-dimensional Network Security Situation Assessment [J].
Zhu, Lina ;
Xia, Guoen ;
Zhang, Zuochang ;
Li, Jianhua ;
Zhou, Renjie .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11) :153-164
[46]   An overall design of network security situation assessment system [J].
Zhao, Yuxin ;
Hu, Yuan .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 :1132-1136
[47]   Research on Situation Evaluation Based on Artificial Immune for Network Security [J].
Zhang, Ruirui ;
Xiao, Xin .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 :4926-4930
[48]   A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model [J].
Zhang Ruirui ;
Li Tao ;
Xiao Xin ;
Shi Yuanquan .
COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 :212-218
[49]   A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model [J].
Zhang Ruirui ;
Li Tao ;
Xiao Xin ;
Shi Yuanquan .
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, :479-482
[50]   A Stochastic Game Model with Imperfect Information in Cyber Security [J].
Shiva, Sajjan ;
Roy, Sankardas ;
Bedi, Harkeerat ;
Dasgupta, Dipankar ;
Wu, Qishi .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, :308-318