网络与信息安全学报 ›› 2015, Vol. 1 ›› Issue (1): 43-49.doi: 10.11959/j.issn.2096-109x.2015.00006

• 综述 • 上一篇    下一篇

基于博弈论的网络空间安全若干问题分析

朱建明,王秦()   

  1. 中央财经大学 信息学院,北京 100081
  • 修回日期:2015-09-30 出版日期:2015-12-01 发布日期:2016-01-12
  • 作者简介:朱建明(1965-),男,山西太原人,博士,中央财经大学教授,博士生导师,主要研究方向为信息安全、信息系统安全。|王秦(1990-),男,甘肃天水人,中央财经大学博士生,主要研究方向为信息安全经济学。
  • 基金资助:
    国家自然科学基金资助项目(61272398)

Analysis of cyberspace security based on game theory

Jian-ming ZHU,Qin WANG()   

  1. School of Information,Central University of Finance and Economics,Beijing 100081,China
  • Revised:2015-09-30 Online:2015-12-01 Published:2016-01-12
  • Supported by:
    The National Natural Science Foundation of China(61272398)

摘要:

信息安全经济学是信息安全的一个重要研究领域,博弈论是研究信息安全经济学的主要基础理论和工具之一。基于博弈论对网络空间安全的主要问题进行了分析,其中包括网络攻防、密码协议设计和安全技术配置。对于网络安全攻防,重点分析了攻防双方的对抗状况和防守方之间的互相依赖;对于密码协议设计,重点分析了博弈论在秘密共享和安全多方计算当中的应用;对于安全技术配置,重点分析了博弈论在入侵检测系统和防火墙技术中的应用。最后指出了当前研究存在的不足和信息安全经济学未来的研究方向。

关键词: 网络空间安全, 博弈论, 密码学

Abstract:

Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.

Key words: cyberspace security, game theory, cryptography

中图分类号: 

No Suggested Reading articles found!