Computer Science ›› 2016, Vol. 43 ›› Issue (1): 195-201.doi: 10.11896/j.issn.1002-137X.2016.01.044

Previous Articles     Next Articles

Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast

ZHANG Heng-wei, ZHANG Jian and HAN Ji-hong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To better solve the issue of information security defense strategies selection,in view of the characters that attacker and defender’s objectives are oppositional,strategies are interdependent and relationship is non-cooperative,the non-cooperative nonzero-sum attack-defense game model was built.In the model,an improved payoff calculation method was presented.The method takes the defender counterattack payoff into account,therefore the equilibrium is calculated more accurately.With analyzing the mixed strategy game equilibrium,attack action can be credibly forecasted based on rationality hypothesis.On the basis of attack action forecast,an algorithm of defense strategies selection was proposed,which can select the optimal defense strategies against the attack threat.The example analysis proves the effectiveness of the model and algorithm.

Key words: Non-cooperative game,Counterattack payoff,Mixed strategy,Equilibrium analysis,Attack forecast,Defense strategies selection

[1] Fang Bin-xing.Explain the innovation and breakthrough of in-formation security [EB/OL].http://www.Cert.org.crdarticles/news/common/2012051823317.html
[2] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model [J].Chinese Journal of Computers,2009,32(4):817-827(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827
[3] Wang Yuan-zhuo,Lin Chuang,Cheng Xue-qi,et al.Analysis for Network Attack-Defense Based on Stochastic Game Model [J].Chinese Journal of Computers,2010,33(9):1748-1762(in Chinese)王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010,33(9):1748-1762
[4] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model [J].Journal of Computer Research and Development,2010,47(10):1714-1723(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防随机博弈模型的防御策略选取研究[J].计算机研究与发展,2010,7(10):1714-1723
[5] 谢政.对策论导论[M].北京:科学出版社,2010
[6] Lin Wang-qun,Wang Hui,Liu Jia-hong,et al.Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory [J].Journal of Computer Research and Development,2011,48(2):306-316(in Chinese)林旺群,王慧,刘家红,等.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316
[7] Liu Yu-ling,Feng Deng-guo,Wu Li-hui,et al.Performance Eva-luation of Worm Attack and Defense Strategies Based on Static Bayesian Game [J].Journal of Software,2012,23(3):712-723(in Chinese) 刘玉玲,冯登国,吴丽辉,等.基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J].软件学报,2012,23(3):712-723
[8] Shi Le-yi,Jiang Lan-lan,Jia Chun-fu,et al.A Game TheoreticAnalysis for the Honeypot Deceptive Mechanism [J].Journal of Electronics & Information Technology,2012,34(6):1420-1424(in Chinese)石乐义,姜蓝蓝,贾春福,等.蜜罐诱骗防御机理的博弈理论分析[J].电子与信息学报,2012,34(6):1420-1424
[9] Carin L,Cybenko G,Hughes J.Quantitative evaluation of risk for investment efficient strategies in cyber security:The queries methodology [J].IEEE Computer System,2013,47(7):235-242
[10] Gueye A,Walrand J C.Security in Networks:A Game-Theoretic Approach [C]∥Proceedings of the 47th IEEE Conference on Decision and Control Cancun.Mexico:Springer,2013:829-834
[11] Gordon L,Loeb M,Lucyshyn W.CSI/FBI computer crime and security survey [C]∥Proceedings of the Computer Security Institute.San Francisco:Springer,2012:12-29
[12] National vulnerability database version 2.3 [EB/OL].http://nvd.nis.gov/2013
[13] Nash J.Non-cooperative games [J].Annals of Mathematics,1951,54(2):286-295
[14] Mckelvey T,Richard D,Mclennan K.Gambit:Software tools for game theory [EB/OL].http://www.gambit-project.org

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .