Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [11] Coordinated Cyber Physical Attacks and Defense Strategy in Cyber-Physical Power Systems Based on Game Theory
    Yang, Jun
    Zhao, Yulong
    Dong, Chenchen
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2025,
  • [12] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [13] Analysis of SDN Attack and Defense Strategy Based on Zero-Sum Game
    Zhou, Rongfu
    Lin, Jun
    Liu, Lan
    Ye, Min
    Wei, Shunhe
    ADVANCES IN BRAIN INSPIRED COGNITIVE SYSTEMS, 2020, 11691 : 479 - 485
  • [14] Intelligent Jamming Strategy for Wireless Communications Based on Game Theory
    Li, Yongcheng
    Miao, Weijian
    Gao, Zhenzhen
    Lv, Gangming
    IEEE ACCESS, 2024, 12 : 110064 - 110077
  • [15] CCS: A Correct Cooperation Strategy based on game theory for MANETS
    Amraoui, Hicham
    Habbani, Ahmed
    Hajami, Abdelmajid
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 326 - 332
  • [16] Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model
    Ji, Xiao-Peng
    Tian, Wen
    Liu, Weiwei
    Liu, Guangjie
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8859 - 8866
  • [17] Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory
    Qiu, Yihui
    Chen, Zhide
    Xu, Li
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [18] Optimal dispatch strategy analysis of fire extinguishing equipment for electric grid wildfire based on dynamic game
    Jian, Zhou
    Guo, Jun
    Xu, Xunjian
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2020, 30 (04)
  • [19] Research on the evolution of tripartite data protection strategy based on game theory
    Yang, Mingxin
    Feng, Lei
    Zhang, Xiaoming
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2023, 17
  • [20] Scheduling Algorithm Based on Heterogeneity and Confidence for Mimic Defense
    Zhang, Wenjian
    Wei, Shuai
    Tian, Le
    Song, Ke
    Zhu, Zhengbin
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 971 - 997