Active Defense strategies selection for network mixed malicious action

被引:0
作者
Chen Yong-qiang [1 ]
Wu Xiao-ping [1 ]
Fu Yu [1 ]
机构
[1] Naval Univ Engn, Dept Informat Secur, Wuhan, Peoples R China
来源
PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013) | 2013年 / 52卷
关键词
network security; game; active defense; strategies selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to deal with the problems that defense measures are not been take into accounted and the return of the unit cost in network security analysis, a active defense strategies selection method for network mixed malicious actions was proposed. Firstly, a network security mixed game model was presented combined with the actual situation that the utility of the players are not equal. Premise in the classification of the mixed confront scenes, the utility function was proposed with the return of the unit cost. Then, the network mixed defense strategy selection algorithm was given and the best strategy for defender was obtained by analyzing the Nash equilibrium of the game model. Finally, a representative example is given to illustrate the efficacy and feasibility of the method on malicious actions prediction and active defense strategy selection.
引用
收藏
页码:336 / 340
页数:5
相关论文
共 9 条
  • [1] Browne R, 2000, P 21 CENT MIL COMM A, V1, P417
  • [2] [姜伟 JIANG Wei], 2009, [计算机学报, Chinese Journal of Computers], V32, P817
  • [3] [林旺群 Lin Wangqun], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P306
  • [4] Lye K., 2002, P 15 IEEE COMP SEC F, P71
  • [5] Northcutt S., 1999, NETWORKING INTRUSION
  • [6] Osborne MJ., 1994, A Course in Game Theory
  • [7] Wang Yuan-Zhuo, 2010, Chinese Journal of Computers, V33, P1748, DOI 10.3724/SP.J.1016.2010.01748
  • [8] Wenke Lee, 2002, Journal of Computer Security, V10, P5
  • [9] Zhang Shao-jun, 2008, Journal of Shanghai Jiaotong University, V42, P198