Skip to main content

Network Defense Decision-Making Method Based on Stochastic Differential Game Model

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11067))

Included in the following conference series:

  • 2132 Accesses

Abstract

In the actual network attack and defense, the attack-defense behaviors generally change dynamically and continuously. Besides, since kinds of random disturbance is inevitable, the evolution of network security state actually is random. To model and analyze network security problems more accurately, we used the Gaussian white noise to describe the random disturbance. Then from the perspective of real-time attack and defense, we characterized the random and continuous evolution of network security state referring to dynamic epidemical model and the Itó stochastic differential equations. Based on previous statements, the attack and defense stochastic differential game model was constructed, and the saddle point strategy for the game was proposed. Additionally, we designed an optimal defense strategy selection algorithm to achieve real-time selection of the optimal defense strategies in continuous and random attack-defense process, which has greater timeliness and accuracy. Finally, simulations demonstrated that the proposed model and method are valid, and we offered specific recommendations for network defense based on the experimental data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fang, B.-X.: A hierarchy model on the research fields of cyberspace security technology. Netw. Inf. Secur. 1(1), 1–6 (2015)

    Google Scholar 

  2. Gordon, L., Loeb, M.: Budgeting process for information security expenditures. Commun. ACM 49(10), 121–125 (2016)

    Google Scholar 

  3. Zhu, J.-M., Song, B., Huang, Q.-F.: Evolution game model of offensive-defense for network security based on system dynamics. J. Commun. 35(1), 54–61 (2014)

    Google Scholar 

  4. White, J., Park, J.S., Kamhoua, C.A., Kwiat, K.A.: Game theoretic attack analysis in online social network (OSN) services. In: Proceedings of the 2014 International Conference on Social Networks Technology, San Diego, USA, pp. 1012–1019. IEEE Press (2015)

    Google Scholar 

  5. Shordon, L., Miao, Q.: Network survivability analysis based on signaling game model. Multimed. Inf. Netw. Secur. 55(5), 199–204 (2016)

    Google Scholar 

  6. Lin, W.-Q., Wang, Hui, Liu, J.-H.: Research on active defense technology in network security based on non-cooperative dynamic game theory. J. Comput. Res. Dev. 48(2), 306–316 (2014)

    Google Scholar 

  7. Zhang, H.-W., Yu, D.-K.: Network security threat assessment based on signaling game. J. Xidian Univ. 43(3), 137–143 (2016)

    Google Scholar 

  8. Yeung, D.W.K., Petrosyan, L.A.: Differential Games Theory. Springer Press, New York (2014)

    MATH  Google Scholar 

  9. Jiang, W., Fang, B.-X., Tian, Z.-H.: Research on defense strategies selection based on attack-defense stochastic game model. J. Comput. Res. Dev. 47(10), 1714–1723 (2014)

    Google Scholar 

  10. Wang, Y.-Z., Lin, C., Cheng, X.-Q., Fang, B.-X.: Evolutionary game model and analysis methods for network group behavior. J. Comput. Sci. Technol. 38(2), 282–300 (2014)

    MathSciNet  Google Scholar 

  11. Nilim, A., Ghaoui, L.E.: Robust control of Markov decision processes with uncertain transition matrices. Oper. Res. 53(5), 780–798 (2016)

    Article  MathSciNet  Google Scholar 

  12. Chun-lei, W., Qing, M., Yi-qi, D.: Network survivability analysis based on stochastic game model. Multimed. Inf. Netw. Secur. 55(10), 199–204 (2015)

    Google Scholar 

  13. Yu, M., Liu, C., Qiu, X.-L., Zhao, S.: Modelling and analysis of phishing attack using stochastic game. Cybersp. Technol. 46(3), 300–305 (2016)

    Google Scholar 

  14. Zhang, H.-W., Wang, J.-D., Li, T.: Defense policies selection method based on attack-defense signaling game model. J. Commun. 37(5), 32–43 (2016)

    Google Scholar 

  15. Scalable simulation framework[DB/OL], 08 November 2012–23 September 2016. http://www.ssfnet.org

  16. Shen, S.G., Li, Y., Xu, H.Y.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math Appl. 62(6), 2404–2416 (2015)

    Article  MathSciNet  Google Scholar 

  17. Dadsk, A.: Preventing DDoS attacks in wireless sensor networks: a repeated game theory approach. ACM Trans. Inf. Syst. Secur. 13(2), 145–153 (2015)

    Google Scholar 

  18. Zhang, H.-W., Li, T.: Optimal active defense based on multi-stage attack-defense signaling game. Acta electron. Sin. 45(2), 431–439 (2017)

    MathSciNet  Google Scholar 

  19. Zhuang, W.-Y.: Study on Emergency Decision Making of Major Projects Based on Dynamic Differential Game Theory. School of Mathematics, Shandong University, Jinan (2014)

    Google Scholar 

  20. Moore, D., Shannon, C., Voelker, G.M.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of the 22’th International Conference of the IEEE Computer and Communications Societies, pp. 169–179. IEEE Press, Houston (2015)

    Google Scholar 

  21. Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: CSI/FBI computer crime and security survey. In: Proceedings of the 2015 Computer Security Institute, pp. 48–64. IEEE Press, San Francisco (2015)

    Google Scholar 

  22. Matlab 2014 user’s guide and reference manual[EB/OL], 16 March 2014–23 August 2017. http://www.mathworks.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shirui Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, S., Zhang, H., Wang, J., Huang, J. (2018). Network Defense Decision-Making Method Based on Stochastic Differential Game Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11067. Springer, Cham. https://doi.org/10.1007/978-3-030-00018-9_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00018-9_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00017-2

  • Online ISBN: 978-3-030-00018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics