Computer Science ›› 2018, Vol. 45 ›› Issue (10): 138-141.doi: 10.11896/j.issn.1002-137X.2018.10.026

• Information Security • Previous Articles     Next Articles

Evaluation of Network Node Invasion Risk Based on Fuzzy Game Rules

LIU Jian-feng1, CHEN Jian2   

  1. Network Information Center,Nanjing University,Nanjing 210023,China 1
    Department of Computer Science and Technology,Nanjing University,Nanjing 210023,China 2
  • Received:2017-08-14 Online:2018-11-05 Published:2018-11-05

Abstract: In order to evaluate network security state in real time and make up for the shortcomings of low accuracy and poor practicability of traditional network node intrusion risk assessment method,a new network node intrusion risk assessment method based on fuzzy game rules was proposed.A set of finite state sets is used to describe the network,and the benefit matrix and fuzzy game elements are given to obtain the expected income of intruders and network nodes.On this basis,the fuzzy game rules are given.The risk assessment model is constructed according to the assets,threats,weaknesses and risk factors through the fuzzy game rules.After the quantification of the strategy cost and income,the fuzzy game tree of the network node is established,and the nash equilibrium is obtained.Combined with the income function of intruders and network nodes,the expectation of network nodes’ risk under fuzzy game rules is obtained,and the value of network node’s intrusion risk is determined.The threshold value is used to judge whether alarm is needed to prevent the network node from being invaded.Experimental results show that the proposed method has high accuracy,reliability and practicability.

Key words: Evaluation, Fuzzy game rule, Intrusion, Network node, Risk

CLC Number: 

  • TP309
[1]LIU W F,ZHANG S W,GONG X.An Improved Network Risk Evaluation Method Based on Markov Game[J].Telecommunications Science,2014,30(7):13-18.(in Chinese)
刘文芬,张树伟,龚心.一种优化的基于Markov博弈理论的网络风险评估方法[J].电信科学,2014,30(7):13-18.
[2]ZHANG J,WANG J D,ZHANG H W,et al.Network Risk Analysis Method Based on Node-Game Vulnerability Attack Graph[J].Computer Science,2014,41(9):169-173.(in Chinese)
张健,王晋东,张恒巍,等.基于节点博弈漏洞攻击图的网络风险分析方法[J].计算机科学,2014,41(9):169-173.
[3]LEI J G.Simulation of Game Detection under Unbalanced Invasion Characteristics[J].Computer Simulation,2015,32(9):307-310.(in Chinese)
雷剑刚.不平衡网络入侵特征下的博弈检测仿真[J].计算机仿真,2015,32(9):307-310.
[4]LAI C,CHEN X,CHEN X,et al.A fuzzy comprehensive evaluation model for flood risk based on the combination weight of game theory[J].Natural Hazards,2015,77(2):1243-1259.
[5]GUI M Q,LIU Y B, ZHOU L Y.Intrusion detection based on game theory in wireless sensor network[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(3):414-420.(in Chinese)
桂明倩,刘宴兵,周嘹永.WSN中基于博弈理论的入侵检测研究[J].重庆邮电大学学报(自然科学版),2016,28(3):414-420.
[6]REN L C, LI Z F.A New Model Based on the Games Theory and Fuzzy Mathematics in Bridge Engineering Risk Assessment[J].Highway Engineering,2017,42(1):163-169.(in Chinese)
任丽超,栗振锋.基于博弈论和模糊数学的桥梁风险评价模型[J].公路工程,2017,42(1):163-169.
[7]YU D K,WANG J D,ZHANG H W,et al.Risk assessment selection based on static Bayesian game[J].Computer Engineering and Science,2015,37(6):1079-1086.(in Chinese)
余定坤,王晋东,张恒巍,等.基于静态贝叶斯博弈的风险评估方法研究[J].计算机工程与科学,2015,37(6):1079-1086.
[8]XIE Q L.Design of wireless sensor network the sink node based on OK6410[J].Electronic Design Engineering,2016,24(6):159-161.(in Chinese)
谢巧玲.基于OK6410的无线传感器网络汇聚节点设计[J].电子设计工程,2016,24(6):159-161.
[9]HAN L,SONG Y,DUAN L,et al.Risk assessment methodology for Shenyang Chemical Industrial Park based on fuzzy comprehensive evaluation[J].Environmental Earth Sciences,2015,73(9):5185-5192.
[10]SHI L B,JIAN Z.ulnerability Assessment of Cyber Physical Power System Based on Dynamic Attack-defense Game Model[J].Automation of Electric Power Systems,2016,40(17):99-105.(in Chinese)
石立宝,简洲.基于动态攻防博弈的电力信息物理融合系统脆弱性评估[J].电力系统自动化,2016,40(17):99-105.
[11]HUANG L L,YAO A L,XIAN T,et al.Research on risk assessment method of oil & gas pipeline with consideration of vulnerability[J].China Safety Science Journal,2014,24(7):93-99.(in Chinese)
黄亮亮,姚安林,鲜涛,等.考虑脆弱性的油气管道风险评估方法研究[J].中国安全科学学报,2014,24(7):93-99.
[12]ZHANG H W,ZHANG J,HAN J H,et al.Vulnerability risk analysis method based on game model and risk matrix[J].Computer Engineering and Design,2016, 37(6):1421-1427.(in Chinese)
张恒巍,张健,韩继红,等.基于博弈模型和风险矩阵的漏洞风险分析方法[J].计算机工程与设计,2016,37(6):1421-1427.
[13]ZHANG Y.Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information[J].Journal of Intelligent & Fuzzy Systems,2015,28(1):199-204.
[14]XI R R,YUN X C,ZHANG Y Z,et al.An Improved Quantitative Evaluation Method for Network Security[J].Chinese Journal of Computers,2015,38(4):749-758.(in Chinese)
席荣荣,云晓春,张永铮,等.一种改进的网络安全态势量化评估方法[J].计算机学报,2015,38(4):749-758.
[15]SONG Y U,CHENE J.Research of Aircraft Maintenance Unit Risk Management Based on the Generalized Linear Regression Model[J].Bulletin of Science and Technology,2016,32(1):215-219.(in Chinese)
宋云雪,陈金.基于广义线性回归模型的飞机维修单位风险管理研究[J].科技通报,2016,32(1):215-219.
[16]DAI W.Application of Intrusion Detection Technology in Network Security[J].Journal of Chongqing Institute of Technology,2018,32(4):156-160,185.(in Chinese)
代威.入侵检测技术在网络安全中的应用[J].重庆理工大学学报(自然科学),2018,32(4):156-160,185.
[1] FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282.
[2] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[3] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[4] WU Gong-xing, Sun Zhao-yang, JU Chun-hua. Closed-loop Supply Chain Network Design Model Considering Interruption Risk and Fuzzy Pricing [J]. Computer Science, 2022, 49(7): 220-225.
[5] JIANG Sheng-teng, ZHANG Yi-chi, LUO Peng, LIU Yue-ling, CAO Kuo, ZHAO Hai-tao, WEI Ji-bo. Analysis of Performance Metrics of Semantic Communication Systems [J]. Computer Science, 2022, 49(7): 236-241.
[6] GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331.
[7] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[8] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[9] XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660.
[10] ZHU Xu-hui, SHEN Guo-jiao, XIA Ping-fan, NI Zhi-wei. Model Based on Spirally Evolution Glowworm Swarm Optimization and Back Propagation Neural Network and Its Application in PPP Financing Risk Prediction [J]. Computer Science, 2022, 49(6A): 667-674.
[11] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[12] LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302.
[13] ZHU Min, LIANG Zhao-hui, YAO Lin, WANG Xiang-kun, CAO Meng-qi. Survey of Visualization Methods on Academic Citation Information [J]. Computer Science, 2022, 49(4): 88-99.
[14] CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139.
[15] LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!