基于不完全信息动态博弈的动态目标防御最优策略选取研究
Research on Optimal Selection of Moving Target Defense Policy Based on Dynamic Game with Incomplete Information
查看参考文献17篇
文摘
|
针对动态目标防御的最优策略选取问题,分析了动态目标防御环境下的攻防对抗特点,提出了动态目标防御策略的收益量化方法,基于不完全信息动态博弈构建了面向动态目标防御的单阶段和多阶段博弈模型,给出了精炼贝叶斯均衡求解算法和先验信念修正方法,获得了不同安全态势下的最优动态目标防御策略.最后,通过实例说明和验证了上述模型和方法的可行性和有效性,总结了利用动态目标防御策略进行网络防御的一般性规律. |
其他语种文摘
|
This paper is focused on the optimal policy selection for moving target defense.Attack-defense confrontation in moving target defense environment is analyzed.Reward quantization method of moving target defense policy is proposed.Single-stage and multi-stage moving target defense game models are constructed based on the dynamic game with incomplete information.The algorithm to obtain perfect Bayesian equilibrium and the method to revise prior belief are proposed.Optimal moving target defense policies are obtained under different security situations.Finally,not only the feasibility and effectiveness of the proposed model and method are illustrated and verified in a representative example but also general rules of network defense using moving target defense policies are summarized. |
来源
|
电子学报
,2018,46(1):82-89 【核心库】
|
DOI
|
10.3969/j.issn.0372-2112.2018.01.012
|
关键词
|
动态目标防御
;
策略选取
;
不完全信息动态博弈
;
精炼贝叶斯均衡
|
地址
|
1.
解放军信息工程大学, 河南, 郑州, 450001
2.
河南省信息安全重点实验室, 河南省信息安全重点实验室, 河南, 郑州, 450001
|
语种
|
中文 |
文献类型
|
研究性论文 |
ISSN
|
0372-2112 |
学科
|
自动化技术、计算机技术 |
基金
|
国家863计划
;
郑州市科技领军人才基金
|
文献收藏号
|
CSCD:6197876
|
参考文献 共
17
共1页
|
1.
Zhuang Rui. Simulation-based approaches to studying effectiveness of moving-target network defense.
Proceedings of the National Symposium on Moving Target Research,2012:15111-15126
|
CSCD被引
1
次
|
|
|
|
2.
NITRD.
Cybersecurity game-change research & development recommendations,2014
|
CSCD被引
3
次
|
|
|
|
3.
Xu Jun. Comparing different moving target defense techniques.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,2014:97-107
|
CSCD被引
2
次
|
|
|
|
4.
姜伟. 基于攻防博弈模型的网络安全测评和最优主动防御.
计算机学报,2009,32(4):817-827
|
CSCD被引
72
次
|
|
|
|
5.
Colbaugh R. Predictability-oriented defense against adaptive adversaries.
Proceedings of the IEEE International Conference on Systems,Man,and Cybernetics (SMC),2012:2721-2727
|
CSCD被引
1
次
|
|
|
|
6.
Manadhata P K. Game Theoretic Approaches to Attack Surface Shifting.
Moving Target Defense II:Application of Game Theory and Adversarial Modeling,2013:1-13
|
CSCD被引
3
次
|
|
|
|
7.
Zhu Quanyan. Game-Theoretic Approach to Feedback-Driven Multi-Stage Moving Target Defense.
International Conference on Decision and Game Theory for Security,2013:246-263
|
CSCD被引
1
次
|
|
|
|
8.
Carter K M. A game theoretic approach to strategy determination for dynamic platform defenses.
Proceedings of the First ACM Workshop on Moving Target Defense,2014:21-30
|
CSCD被引
5
次
|
|
|
|
9.
Winterrose M L. Adaptive attacker strategy development against moving target cyber defenses.
Computer Science,2014,1472:1-11
|
CSCD被引
1
次
|
|
|
|
10.
Miehling E. Optimal defense policies for partially observable spreading processes on Bayesian attack graphs.
Proceedings of the Second ACM Workshop on Moving Target Defense,2015:67-76
|
CSCD被引
3
次
|
|
|
|
11.
Prakash A. Empirical game-theoretic analysis for moving target defense.
Proceedings of the Second ACM Workshop on Moving Target Defense,2015:57-65
|
CSCD被引
2
次
|
|
|
|
12.
Jones S.
Evaluating moving target defense with PLADD,2015
|
CSCD被引
3
次
|
|
|
|
13.
Vadlamudi S G. Moving target defense for web applications using Bayesian Stackelberg games.
Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems,2016:1377-1378
|
CSCD被引
1
次
|
|
|
|
14.
Hamlet J R. Dependency graph analysis and moving target defense selection.
Proceedings of the 2016 ACM Workshop on Moving Target Defense,2016:105-116
|
CSCD被引
2
次
|
|
|
|
15.
Maleki H. Markov modeling of moving target defense games.
Proceedings of the 2016 ACM Workshop on Moving Target Defense,2016:81-92
|
CSCD被引
5
次
|
|
|
|
16.
Van Leeuwen B. Operational cost of deploying moving target defenses defensive work factors.
Proceedings of the 2015 IEEE Military Communications Conference,2015:966-971
|
CSCD被引
1
次
|
|
|
|
17.
Sheyner O. Automated generation and analysis of attack graphs.
Proceedings of 2002 IEEE Symposium on Security and Privacy,2002:273-284
|
CSCD被引
7
次
|
|
|
|
|