计算机科学 ›› 2016, Vol. 43 ›› Issue (1): 195-201.doi: 10.11896/j.issn.1002-137X.2016.01.044

• 信息安全 • 上一篇    下一篇

基于非合作博弈攻击预测的防御策略选取方法

张恒巍,张健,韩继红   

  1. 解放军信息工程大学 郑州450001,解放军信息工程大学 郑州450001,解放军信息工程大学 郑州450001
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61303074,61309013),国家重点基础研究发展计划(“973”计划)基金项目(2012CB315900),河南省科技攻关计划项目(12210231003,13210231002)资助

Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast

ZHANG Heng-wei, ZHANG Jian and HAN Ji-hong   

  • Online:2018-12-01 Published:2018-12-01

摘要: 为更好地解决信息安全防御策略的选取问题,针对攻击方和防御方具有的目标对立性、策略依存性和关系非合作性特征,建立了非合作非零和攻防博弈模型。在模型中提出一种改进的收益量化和计算方法,其包含了对防御者反击收益的考虑,能够更加准确地计算博弈均衡。通过对博弈均衡的混合策略进行分析,在理性假设下实现了对攻击动作的有效预测。在攻击预测的基础上,设计了安全防御策略选取算法,其能够针对攻击威胁实现最优防御策略的选取。实例分析验证了模型和方法的有效性。

关键词: 非合作博弈,反击收益,混合策略,均衡分析,攻击预测,防御策略选取

Abstract: To better solve the issue of information security defense strategies selection,in view of the characters that attacker and defender’s objectives are oppositional,strategies are interdependent and relationship is non-cooperative,the non-cooperative nonzero-sum attack-defense game model was built.In the model,an improved payoff calculation method was presented.The method takes the defender counterattack payoff into account,therefore the equilibrium is calculated more accurately.With analyzing the mixed strategy game equilibrium,attack action can be credibly forecasted based on rationality hypothesis.On the basis of attack action forecast,an algorithm of defense strategies selection was proposed,which can select the optimal defense strategies against the attack threat.The example analysis proves the effectiveness of the model and algorithm.

Key words: Non-cooperative game,Counterattack payoff,Mixed strategy,Equilibrium analysis,Attack forecast,Defense strategies selection

[1] Fang Bin-xing.Explain the innovation and breakthrough of in-formation security [EB/OL].http://www.Cert.org.crdarticles/news/common/2012051823317.html
[2] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model [J].Chinese Journal of Computers,2009,32(4):817-827(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827
[3] Wang Yuan-zhuo,Lin Chuang,Cheng Xue-qi,et al.Analysis for Network Attack-Defense Based on Stochastic Game Model [J].Chinese Journal of Computers,2010,33(9):1748-1762(in Chinese)王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010,33(9):1748-1762
[4] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model [J].Journal of Computer Research and Development,2010,47(10):1714-1723(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防随机博弈模型的防御策略选取研究[J].计算机研究与发展,2010,7(10):1714-1723
[5] 谢政.对策论导论[M].北京:科学出版社,2010
[6] Lin Wang-qun,Wang Hui,Liu Jia-hong,et al.Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory [J].Journal of Computer Research and Development,2011,48(2):306-316(in Chinese)林旺群,王慧,刘家红,等.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316
[7] Liu Yu-ling,Feng Deng-guo,Wu Li-hui,et al.Performance Eva-luation of Worm Attack and Defense Strategies Based on Static Bayesian Game [J].Journal of Software,2012,23(3):712-723(in Chinese) 刘玉玲,冯登国,吴丽辉,等.基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J].软件学报,2012,23(3):712-723
[8] Shi Le-yi,Jiang Lan-lan,Jia Chun-fu,et al.A Game TheoreticAnalysis for the Honeypot Deceptive Mechanism [J].Journal of Electronics & Information Technology,2012,34(6):1420-1424(in Chinese)石乐义,姜蓝蓝,贾春福,等.蜜罐诱骗防御机理的博弈理论分析[J].电子与信息学报,2012,34(6):1420-1424
[9] Carin L,Cybenko G,Hughes J.Quantitative evaluation of risk for investment efficient strategies in cyber security:The queries methodology [J].IEEE Computer System,2013,47(7):235-242
[10] Gueye A,Walrand J C.Security in Networks:A Game-Theoretic Approach [C]∥Proceedings of the 47th IEEE Conference on Decision and Control Cancun.Mexico:Springer,2013:829-834
[11] Gordon L,Loeb M,Lucyshyn W.CSI/FBI computer crime and security survey [C]∥Proceedings of the Computer Security Institute.San Francisco:Springer,2012:12-29
[12] National vulnerability database version 2.3 [EB/OL].http://nvd.nis.gov/2013
[13] Nash J.Non-cooperative games [J].Annals of Mathematics,1951,54(2):286-295
[14] Mckelvey T,Richard D,Mclennan K.Gambit:Software tools for game theory [EB/OL].http://www.gambit-project.org

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!