skip to main content
10.1145/3544109.3544396acmotherconferencesArticle/Chapter ViewAbstractPublication PagesipecConference Proceedingsconference-collections
research-article

Research on Network Security Evaluation and Optimal Active Defense based on Attack and Defense Game Model in Big Data Era

Authors Info & Claims
Published:18 July 2022Publication History

ABSTRACT

Due to the increasing progress of socialist modernization and the increasing progress of social productivity, the national computer industry has developed rapidly in recent years, and has become the main driving force to promote China's economic development. Facing the increasingly complex network environment, the traditional network security technology can not effectively resist the existing network attacks. Low defense and high memory consumption are two disadvantages of traditional network information security assessment. In essence, network security is the process of mutual game between network attackers and network defenders. In the process of mutual game, if one party benefits, it is the winner. In order to carry out the security evaluation and active defense of network information system, the network defense graph model, the classification of attack and defense strategies and their cost quantification method, the network attack and defense game model and the optimal active defense selection algorithm based on the above model are proposed. Based on the attack and defense game theory, this paper analyzes the network security evaluation and optimal active defense methods by establishing a model

References

  1. Huang J , Zhang H , Wang J . Markov Evolutionary Games for Network Defense tactics Selection. IEEE Access, vol.11, no.21, pp.12, 2017.Google ScholarGoogle Scholar
  2. Xiang Y , Wang L . A game-theoretic study of load redistribution attack and defense in power systems. Electric Power Systems Research, vol.51, no.12, pp.25, 2017.Google ScholarGoogle Scholar
  3. Dong C , Zhao L . Sensor network security assessment tactics based on attack graph and improved binary PSO. Safety Science, vol.17, no.81, pp.87, 2019.Google ScholarGoogle Scholar
  4. K, C, Lalropuia, A Bayesian game model and network availability model for small cells under denial of service attack in 5G wireless communication network. Wireless Networks, vol.26, no.15, pp.57, 2020.Google ScholarGoogle Scholar
  5. JK Nystrom, Robbins M J , Deckro R F , Simulating attacker and defender strategies within a dynamic game on network topology. Journal of simulation, vol.12, no.4, pp.31, 2018.Google ScholarGoogle Scholar
  6. Liu G , Peng B , Zhong X . Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack–Defense Game Model. Sensors, vol.21, no.2, pp.54, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  7. Lee I G , Go K , Lee J H . Battery Draining Attack and Defense against Power Saving Wireless LAN Devices. Sensors, vol.20, no.7, pp.43, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  8. Xiao J , Zhen G , Wang B , Security Distance of Distribution Network: Definition and Method. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, vol.37, no.10, pp.28, 2017.Google ScholarGoogle Scholar
  9. Cai X , Wang B , Cao Z , Game Control of Attack and Defense in Cyber Physical System. Procedia Computer Science, vol.87, no.10, pp.48, 2021.Google ScholarGoogle Scholar
  10. La Q D , Quek T , Lee J , Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. IEEE Internet of Things Journal, vol.6, no.11, pp.23, 2016.Google ScholarGoogle Scholar
  11. Ni Z , Li Q , Liu G . Game-Model-Based Network Security Risk Control. Computer, vol.51, no.4, pp.28, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  12. Zhai Q , Ye Z S , Peng R , Defense and attack of performance-sharing common bus systems. European Journal of Operational Research, vol.56, no.3, pp.75, 2017.Google ScholarGoogle Scholar
  1. Research on Network Security Evaluation and Optimal Active Defense based on Attack and Defense Game Model in Big Data Era

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IPEC '22: Proceedings of the 3rd Asia-Pacific Conference on Image Processing, Electronics and Computers
      April 2022
      1065 pages
      ISBN:9781450395786
      DOI:10.1145/3544109

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 July 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)19
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format