Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [31] FlipIt Game Model-Based Defense Strategy Against Cyberattacks on SCADA Systems Considering Insider Assistance
    Liu, Zhaoxi
    Wang, Lingfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2791 - 2804
  • [32] Robust bidding strategy for demand response aggregators in electricity market based on game theory
    Abapour, Saeed
    Mohammadi-Ivatloo, Behnam
    Hagh, Mehrdad Tarafdar
    JOURNAL OF CLEANER PRODUCTION, 2020, 243 (243)
  • [33] Analysis on bidding strategy of power provider by game theory
    Yang, Zhenglin
    Song, Yanmin
    Cao, Rongzhang
    Tang, Guoqing
    2006 INTERNATIONAL CONFERENCE ON POWER SYSTEMS TECHNOLOGY: POWERCON, VOLS 1- 6, 2006, : 621 - +
  • [34] Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack
    Guo, Youqi
    Wang, Lingfeng
    Liu, Zhaoxi
    Shen, Yitong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 131 (131)
  • [35] Adaptive Dynamic Programming and Optimal Control of Unknown Multiplayer Systems Based on Game Theory
    Zhao, Jingang
    IEEE ACCESS, 2022, 10 : 77695 - 77706
  • [36] Evolutionary Game-Based Defense Mechanism in the MANETs
    Bouhaddi, Myria
    Adi, Kamel
    Radjef, Mohammed Said
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 88 - 95
  • [37] Optimal Active Defense Using Dynamic Multi-Stage Signaling Game
    Zhang Hengwei
    Li Tao
    Wang Jindong
    Han Jihong
    CHINA COMMUNICATIONS, 2015, 12 (02) : 114 - 122
  • [38] Optimal Control for Positive and Negative Information Diffusion Based on Game Theory in Online Social Networks
    Wan, Pengfei
    Wang, Xiaoming
    Min, Geyong
    Wang, Liang
    Lin, Yaguang
    Yu, Wangyang
    Wu, Xiaojun
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (01): : 426 - 440
  • [39] Optimal Strategy of Attack-Defense Interaction Over Load Frequency Control Considering Incomplete Information
    Bi, Wenjun
    Chen, Chunyu
    Zhang, Kaifeng
    IEEE ACCESS, 2019, 7 : 75342 - 75349
  • [40] An Active Defense Adjudication Method Based on Adaptive Anomaly Sensing for Mimic IoT
    Shao, Sisi
    Gu, Tiansheng
    Nie, Yijun
    Ji, Zongkai
    Wu, Fei
    Ba, Zhongjie
    Ji, Yimu
    Ren, Kui
    Sun, Guozi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2025, 18 (01) : 57 - 71