期刊文献+

基于不完全信息动态博弈的入侵容忍技术 被引量:2

Intrusion tolerance based on dynamic game of incomplete information
下载PDF
导出
摘要 为了使入侵容忍系统和可疑者进行最优的策略选择,提出了基于不完全信息动态博弈的入侵容忍技术。根据博弈双方的特点,引入两人随机博弈模型进行分析,并通过精炼贝叶斯纳什均衡来确定双方选择最优的策略。同时为了能够确定可疑者类型,采用熵权和灰色关联分析的方法来进行推理。结合实例使用各种行为特征值来计算灰色关联度,从而在博弈过程中判断可疑者是黑客的概率,验证了该方法的可行性和客观性,从而更好地帮助入侵容忍系统进行策略选择。 In order to help the intrusion tolerance system and suspicious persons to choose the optimal strategies,the intrusion tolerant technology based on incomplete information dynamic game is put forward.According to the characteristics of two sides in the game,the two-player stochastic game models is introduced to analyze the relations,and the perfect Bayesian Nash equilibrium is presented to identify the optimal strategy for them.To estimate the types of suspicious persons,the entropy weight and the gray relational analysis are adopted.With examples,the value of gray correlation degree is calculated by virtue of the behavioral features,and that can help to determine the probability of hackers in the game process,as well to find the optimal strategies for intrusion tolerance system,its feasibility and objectivity are proved.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第11期2430-2431,2486,共3页 Computer Engineering and Design
基金 国家"211工程"重点建设基金项目(181070H901)
关键词 不完全信息动态博弈 入侵容忍 黑客 熵权 灰色关联分析 dynamic game of incomplete information intrusion tolerance hacker entropy weight gray relational analysis
  • 相关文献

参考文献11

  • 1Zhao Kuo,Nurbol,Ren Fei,et al.Surveys on the Intrusion Tolerance system [M]. Communications and networking in China. Springer Berlin Heidelberg,2009:90-97. 被引量:1
  • 2Li Bingyang, Wang Huiqiang, Feng Guangsheng. Adaptive hierarchical intrusion tolerant model based on autonomic computing[C].International Conference on Security Technology,2008: 137-141. 被引量:1
  • 3Gong Fengmin, Katerina Goseva-Popstojanova, Wang Feiyi. Characterizing intrusion tolerant systems using a state transition model[C]. DARPA Information Survivability Conference & Exposition II,2001:211-221. 被引量:1
  • 4John C Harsanyi.Games with incomplete information played by "Bayesian"players, Ⅰ -Ⅲ[J].Management Science,2004,50(12): 1804-1817. 被引量:1
  • 5MBA智库百科.博弈论[EB/OL].http://wiki.mbalib.com/wiki/%E5%8D%9A%E5%BC%88%E8%AE%BA. 被引量:1
  • 6Kong-wei Lye,Jeannette M Wing.Game strategies in network security[J]. International Journal of Information Security,2005(4): 71-86. 被引量:1
  • 7张维迎著..博弈论与信息经济学[M].上海:上海人民出版社;上海,2004:364.
  • 8肖红云,肖兵.综合集成赋权法在数据融合能力评估中的应用[J].湖南工业大学学报,2008,22(5):82-85. 被引量:4
  • 9Le Hegarat-Mascle S,Richard D,OttleC.Multi-scale data fusion using Dempster-Shafer evidence theory[C].Geoscience and Remote Sensing Symposium,2002:911-913. 被引量:1
  • 10李国良,付强,孙勇,冯艳.基于熵权的灰色关联分析模型及其应用[J].水资源与水工程学报,2006,17(6):15-18. 被引量:72

二级参考文献21

共引文献74

同被引文献32

  • 1彭代彦.农业机械化与粮食增产[J].经济学家,2005(3):50-54. 被引量:26
  • 2杨宇.多指标综合评价中赋权方法评析[J].统计与决策,2006,22(13):17-19. 被引量:213
  • 3Bygkues M, Colazzo D, Crafa S, et al. A type system for discretionary access control[J]. Mathematical Struc- tures in Computer Science, 2009,19(4) : 839-875. 被引量:1
  • 4Ray I, Kumar NL Towards a location-based mandatory access control model[J]. Computers &- Security, 2006, 25(1) :36-44. 被引量:1
  • 5Martinez GarciA C, Navarri ARrribas G, Borrell J. Fuzzy Role-based access control[J]. Information Pro- cessing Letters, 2011,111 (10): 483-487. 被引量:1
  • 6OASIS. Profiles for the OASIS security assertion markup language (SAML) version2. 0[EB/OL]. (2005-03-15). ht- tp:///does, oasis- open. org/security/saml/v2. O/saml-2. 0- oa zip. 被引量:1
  • 7OASIS. Extensible access control markup language (XACML) version2. 0. working draft 09 [EB/OL]. (2004-04-16). http.-//www, oasis- open. org/commit- tees/download, php/10577/XACML-2. 0-os-all. zip. 被引量:1
  • 8Calheiros R N, Ranjan R, Beloglazov A, et al. Cloud- Sim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms[J]. Software: Practice and Ex- perience,2011,41(1) :23-50. 被引量:1
  • 9李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 10李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,21(1):163-176. 被引量:50

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部