Multi-Player Evolutionary Game of Network Attack and Defense Based on System Dynamics

被引:8
作者
Yang, Pengxi [1 ]
Gao, Fei [1 ]
Zhang, Hua [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
network attack and defense; multi-player game; system dynamics; evolutionary game theory; bounded rationality; evolutionarily stable strategy; penalty strategy; SECURITY INVESTMENT; IMPACT; MODEL;
D O I
10.3390/math9233014
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
We formalize the adversarial process between defender and attackers as a game and study the non-cooperative evolutionary game mechanism under bounded rationality. We analyze the long-term dynamic process between the attacking and defending parties using the evolutionary stable strategies derived from the evolutionary game model. First, we construct a multi-player evolutionary game model consisting of a defender and multiple attackers, formally describe the strategies, and construct a three-player game payoff matrix. Then, we propose two punishment schemes, i.e., static and dynamic ones. Moreover, through the combination of mathematical derivation with simulation, we obtain the evolutionary stable strategies of each player. Different from previous work, in this paper, we consider the influence of strategies among different attackers. The simulation shows that (1) in the static punishment scheme, increasing the penalty can quickly control the occurrence of network attacks in the short term; (2) in the dynamic punishment scheme, the game can be stabilized effectively, and the stable state and equilibrium values are not affected by the change of the initial values.
引用
收藏
页数:18
相关论文
共 47 条
  • [1] [Anonymous], 2019, REG EU 2019 881 EUR
  • [2] [Anonymous], 2019, GLOBAL INFORM SECURI
  • [3] [Anonymous], 2021, Kaspersky security bulletin 2021
  • [4] A game theoretic investigation of deception in network security
    Carroll, Thomas E.
    Grosu, Daniel
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1162 - 1172
  • [5] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [6] Cyber-security in smart grid: Survey and challenges
    El Mrabet, Zakaria
    Kaabouch, Naima
    El Ghazi, Hassan
    El Ghazi, Hamid
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 469 - 482
  • [7] Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach
    Feng, Shaohan
    Xiong, Zehui
    Niyato, Dusit
    Wang, Ping
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 995 - 1007
  • [8] Feng SH, 2018, IEEE INT CONF CL NET
  • [9] An Anti-Jamming Hierarchical Optimization Approach in Relay Communication System via Stackelberg Game
    Feng, Zhibin
    Ren, Guochun
    Chen, Jin
    Chen, Chaohui
    Yang, Xiaoqin
    Luo, Yijie
    Xu, Kun
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (16):
  • [10] SYSTEM DYNAMICS, SYSTEMS THINKING, AND SOFT OR
    FORRESTER, JW
    [J]. SYSTEM DYNAMICS REVIEW, 1994, 10 (2-3) : 245 - 256