ABSTRACT
Due to the increasing progress of socialist modernization and the increasing progress of social productivity, the national computer industry has developed rapidly in recent years, and has become the main driving force to promote China's economic development. Facing the increasingly complex network environment, the traditional network security technology can not effectively resist the existing network attacks. Low defense and high memory consumption are two disadvantages of traditional network information security assessment. In essence, network security is the process of mutual game between network attackers and network defenders. In the process of mutual game, if one party benefits, it is the winner. In order to carry out the security evaluation and active defense of network information system, the network defense graph model, the classification of attack and defense strategies and their cost quantification method, the network attack and defense game model and the optimal active defense selection algorithm based on the above model are proposed. Based on the attack and defense game theory, this paper analyzes the network security evaluation and optimal active defense methods by establishing a model
- Huang J , Zhang H , Wang J . Markov Evolutionary Games for Network Defense tactics Selection. IEEE Access, vol.11, no.21, pp.12, 2017.Google Scholar
- Xiang Y , Wang L . A game-theoretic study of load redistribution attack and defense in power systems. Electric Power Systems Research, vol.51, no.12, pp.25, 2017.Google Scholar
- Dong C , Zhao L . Sensor network security assessment tactics based on attack graph and improved binary PSO. Safety Science, vol.17, no.81, pp.87, 2019.Google Scholar
- K, C, Lalropuia, A Bayesian game model and network availability model for small cells under denial of service attack in 5G wireless communication network. Wireless Networks, vol.26, no.15, pp.57, 2020.Google Scholar
- JK Nystrom, Robbins M J , Deckro R F , Simulating attacker and defender strategies within a dynamic game on network topology. Journal of simulation, vol.12, no.4, pp.31, 2018.Google Scholar
- Liu G , Peng B , Zhong X . Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors, vol.21, no.2, pp.54, 2021.Google ScholarCross Ref
- Lee I G , Go K , Lee J H . Battery Draining Attack and Defense against Power Saving Wireless LAN Devices. Sensors, vol.20, no.7, pp.43, 2020.Google ScholarCross Ref
- Xiao J , Zhen G , Wang B , Security Distance of Distribution Network: Definition and Method. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, vol.37, no.10, pp.28, 2017.Google Scholar
- Cai X , Wang B , Cao Z , Game Control of Attack and Defense in Cyber Physical System. Procedia Computer Science, vol.87, no.10, pp.48, 2021.Google Scholar
- La Q D , Quek T , Lee J , Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. IEEE Internet of Things Journal, vol.6, no.11, pp.23, 2016.Google Scholar
- Ni Z , Li Q , Liu G . Game-Model-Based Network Security Risk Control. Computer, vol.51, no.4, pp.28, 2018.Google ScholarCross Ref
- Zhai Q , Ye Z S , Peng R , Defense and attack of performance-sharing common bus systems. European Journal of Operational Research, vol.56, no.3, pp.75, 2017.Google Scholar
- Research on Network Security Evaluation and Optimal Active Defense based on Attack and Defense Game Model in Big Data Era
Recommendations
Research on Simulation of Network Attack and Defense situation based on Evolutionary Game
ICNCC '20: Proceedings of the 2020 9th International Conference on Networks, Communication and ComputingNetwork attack and defense research is the focus in the field of network security, but most of the existing network attack and defense studies focus on one of the two sides of attacker and defender, which cannot accurately explain the nature of the ...
Optimizing Active Cyber Defense
GameSec 2013: 4th International Conference on Decision and Game Theory for Security - Volume 8252Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to ...
Optimal Network Security Strengthening Using Attack-Defense Game Model
ITNG '09: Proceedings of the 2009 Sixth International Conference on Information Technology: New GenerationsFor assessing the security and optimal strengthening of large enterprise networks, this paper proposes a new approach uses configuration information on firewalls and vulnerability information on all network devices to build defense graphs that show the ...
Comments