期刊文献+

多阶段平台动态防御的信号博弈模型及迁移策略

Signal Game Model and Migration Strategies for Multi-stage Platform Dynamic Defense
下载PDF
导出
摘要 为提升攻防对抗中网络平台的信号识别能力和防御效果,文章提出多阶段平台动态防御的信号博弈模型和迁移策略。首先,从平台动态防御原理入手,分析平台动态防御的拓扑结构和博弈流程,构建了多阶段平台动态防御的信号博弈模型,并给出攻防收益参数定义,引入了探测度和检测因子,分析攻防双方获得的信息对下一阶段博弈的影响。其次,按照信号博弈流程,求解了多阶段均衡策略的精炼贝叶斯均衡,提出了多阶段平台动态防御最优迁移策略选取算法。最后,通过示例和仿真验证了所提模型和策略的有效性。 In order to improve the signal recognition ability and defense effect of network platform in attack defense confrontation,the signal game model and migration strategy of multi-stage platform dynamic defense are proposed.Firstly,starting from the principle of platform dynamic defense,this paper analyzes the topology structure and game flow of platform dynamic defense,constructs the signal game model of multi-stage platform dynamic defense,gives the definition of attack and defense revenue parameters,introduces detection and detection factors,and analyzes the impact of information obtained by both sides on the next stage of the game.Secondly,according to the signal game process,the refined Bayesian equilibrium solution method of multi-stage equilibrium strategy is demonstrated,and then the optimal migration strategy selection algorithm of multi-stage platform dynamic defense is proposed.Finally,the effectiveness of the proposed model and strategy is verified by examples and simulations.
作者 王刚 王志屹 张恩宁 马润年 WANG Gang;WANG Zhiyi;ZHANG Enning;MA Runnian(Institute of Navigation and Communication,Air Force Engineering University,Xi’an,710077,China)
出处 《信息网络安全》 CSCD 北大核心 2021年第5期48-57,共10页 Netinfo Security
基金 国家自然科学基金[61703420]。
关键词 平台动态防御 信号博弈 多阶段 迁移策略 platform dynamic defense signal game multi-stage migration strategy
  • 相关文献

参考文献11

二级参考文献51

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Ruohomaa S,Kutvonen L.Trust management survey//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:77-92 被引量:1
  • 3Theodorakopoulos,George,Baras,John S.On trust models and trust evaluation metrics for ad hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328 被引量:1
  • 4Pal P,Webber F,Atighetchi M,Combs N.Trust assessment from observed behavior:Toward and essential service for trusted network computing//Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Cambridge,MA,USA,2006:285-292 被引量:1
  • 5Ciaran B,Karl K,Jean-Marc S,Vinny C.Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005.Lecture Notes in Computer Science 3477.Berlin:Springer,2005:289-304 被引量:1
  • 6Tian Li-Qin,Lin Chuang,Ji Tie-Guo.Kind of quantitative evaluation of user behaviour trust using AHP.Journal of Computational Information Systems,2007,3(4):1329-1334 被引量:1
  • 7Lin Ai-Zhong,Vullings E,Dalziel J.A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops.Changsha,China,2006:557-564 被引量:1
  • 8Bell M.The use of game theory to measure the vulnerability of stochastic networks.IEEE Transactions on Reliability,2003,52(1):63-68 被引量:1
  • 9Bertino E,Squicciarini A C,Martino L,Paci F.An adaptive access control model for web services.International Journal of Web Services Research,2006,3(3):27-60 被引量:1
  • 10Hassan T,Morteza A,Rasool J.Trust-based user-role assignment in role-based access control//Proceedings of the AICCSA.Amman,Jordan,2007:807-814 被引量:1

共引文献173

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部