Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [21] Differential Game Approach for Attack-Defense Strategy Analysis in Internet of Things Networks
    Wu, Huici
    Gao, Qiuyue
    Tao, Xiaofeng
    Zhang, Ning
    Chen, Dajiang
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 10340 - 10353
  • [22] Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network
    Jie, Yingmo
    Li, Mingchu
    Tang, Tingting
    Guo, Cheng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 5759 - 5779
  • [23] Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory
    Wang, Shengling
    Shi, Hongwei
    Hu, Qin
    Lin, Bin
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 661 - 668
  • [24] Electric Grid Vulnerability Assessment under Attack-Defense Scenario Based on Game Theory
    Jian, Zhou
    Shi, Libao
    Yao, Liangzhong
    Masoud, Bazargan
    2013 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2013,
  • [25] Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory
    Gao, Lijun
    Li, Yanting
    Zhang, Lu
    Lin, Feng
    Ma, Maode
    IEEE ACCESS, 2019, 7 : 43018 - 43030
  • [26] Research on Target Defense Strategy Based on Deep Reinforcement Learning
    Luo, Yuelin
    Gang, Tieqiang
    Chen, Lijie
    IEEE ACCESS, 2022, 10 : 82329 - 82335
  • [27] Optimization of interaction strategy between delivery staff and delivery platform based on game theory
    Li, Huiyuan
    Wang, Zihan
    2022 34TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2022, : 2862 - 2867
  • [28] A Cooperative Merging Strategy for Connected and Automated Vehicles Based on Game Theory With Transferable Utility
    Chen, Ruishuang
    Yang, Zaiyue
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 19213 - 19223
  • [29] Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory
    Chkirbene, Zina
    Hamila, Ridha
    Erbad, Aiman
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1101 - 1106
  • [30] Conditional Probability Voting Algorithm Based on Heterogeneity of Mimic Defense System
    Wei, Shuai
    Zhang, Huihua
    Zhang, Wenjian
    Yu, Hong
    IEEE ACCESS, 2020, 8 : 188760 - 188770