Chinese Journal of Network and Information Security ›› 2015, Vol. 1 ›› Issue (1): 43-49.doi: 10.11959/j.issn.2096-109x.2015.00006
• Comprehensive Reviews • Previous Articles Next Articles
Revised:
2015-09-30
Online:
2015-12-01
Published:
2016-01-12
Supported by:
CLC Number:
Jian-ming ZHU,Qin WANG. Analysis of cyberspace security based on game theory[J]. Chinese Journal of Network and Information Security, 2015, 1(1): 43-49.
[1] | 冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. |
FENG D G , ZHANG M , ZHANG Y ,et al. Study of cloud comput-ing security[J]. Journal of Software, 2011,22(1): 71-83. | |
[2] | ANDERSOR R . Why information security is hard-an economic perspective[EB/OL]. . |
[3] | 姜伟, 方滨兴, 田志宏 ,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,32(4): 817-827. |
JIANG W , FANG B X , TIAN Z H ,et al. The testing of network security and the optimal active defense based on offensive and de-fensive game model[J]. Chinese Journal of Computers, 2009,32(4): 817-827. | |
[4] | HARRINGTON P D . Using noncooperative potential games to improve network security[D]. Stillwater:Oklahoma State Univer-sity, 2010. |
[5] | JEANNETTE K W , WING J . Game strategies in network secu-rity[J]. International Journal of Information Security, 2005,4(1-2): 71-86. |
[6] | MANSHAEI M H , ZHU Q , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2012,45(3): 533-545. |
[7] | VARIAN H . System reliability and free riding[J]. Economics of Information Security Kluwer –, 2004,2(5799): 1-15. |
[8] | GROSSKLAGS J , CHRISTIN N , CHUANG J . Secure or insure?:a game-theoretic analysis of information security games[C]// Proceed-ings of the 17th International Conference on World Wide Web,Bei-jing. 2008: 209-218. |
[9] | GROSSKLAGS J , JOHNSON B , CHRISTIN N . The price of un-certainty in security games[M]// Economics of Information Security& Privacy. Berlin Heidelberg:Springer, 2010: 9-32. |
[10] | GROSSKLAGS J , RADOSAVAC S , CARDENAS A A ,et al. Nudge:intermediaries' role in interdependent network security[J]. Lecture Notes in Computer Science, 2010,6101: 323-336. |
[11] | PAL R , HUI P . Modeling internet security investments:tackling topological information uncertainty[C]// Decision and Game The-ory for Security. Berlin Heidelberg:Springer, 2011: 239-257. |
[12] | NEYYAN R , PAUL A , DESHWAL M ,et al. Game theory based defense mechanism against flooding attack using puzzle[J]. Emerging Trends in Computer Science & Information Technology Etcsit, 2012(2): 35-40. |
[13] | CARROLL T E , GROSU D . A game theoretic investigation of deception in network security[C]// Proceedings of 18th International Conference on Computer Communications and Networks. 2009: 1-6. |
[14] | 孙蔽, 何德全, 孔祥维 ,等. 运用博弈论探讨信息安全问题[J]. 科技管理研究, 2009,29(1): 233-235. |
SUN W , HE D Q , KONG X W ,et al. Discussing the information security problems by using game theory[J]. Science and Technol-ogy Management Research, 2009,29(1): 233-235. | |
[15] | 刘建波 . 一种基于攻防成本博弈的防御策略评价模型[J]. 计算机技术与发展, 2011,21(10): 229-232. |
LIU J B . A evaluation model of defending strategies based on at-tack-defense cost game[J]. Computer Technology and Development, 2011,21(10): 229-232. | |
[16] | KUNREUTHER H , HEAL G . Interdependent security[J]. Journal of Risk & Uncertainty, 2003,26(2-3): 231-249. |
[17] | LASZKA A , FELEGYHAZI M , BUTTYAN L . A survey of inter-dependent information security games[J]. ACM Computing Sur-veys, 2014,47(2). |
[18] | JOHNSONA B,GROSSKLAGSBJ , CHRISTINA N ,et al. Un-certainty in interdependent security games[J]. Decision Game Theory for Security, 2010,6442: 234-244. |
[19] | 吕俊杰, 邱菀华, 王元卓 . 基于相互依赖性的信息安全投资博弈[J]. 中国管理科学, 2006,14(3): 7-12. |
LV J J , QIU W H , WANG Y Z . The information security investment games based on interdependency[J]. Chinese Journal of Manage-ment Science, 2006,14(3): 7-12. | |
[20] | 吕俊杰, 邱菀华, 王元卓 . 网络安全投资外部性及博弈策略[J]. 北京航空航天大学学报, 2006,32(12): 1499-1502. |
LV J J , QIU W H , WANG Y Z . Network security investment exter-nality and game strategies[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006,32(12): 1499-1502. | |
[21] | 孙蔽, 孔祥维, 何德全 ,等. 基于演化博弈论的信息安全攻防问题研究[J]. 情报科学, 2008(9): 1408-1412. |
SUN W , KONG X W , HE D Q ,et al. Study of information security attack and defend based on evolutionary game theory[J]. Informa-tion Science, 2008(9): 1408-1412. | |
[22] | DODIS Y , RABIN T . Cryptography and game theory[J]. Algo-rithmic Game Theory, 2007(1). |
[23] | KATZ J , . Bridging game theory and cryptography:recent results and future directions[M]// Theory of Cryptography. Berlin Heidel-berg:Springer, 2008: 251-272. |
[24] | KOL G , NAOR M . Cryptography and game theory:designing protocols for exchanging information[M]// Theory of Cryptography. Berlin Heidelberg:Springer, 2008: 320-339. |
[25] | GOSSNER O , TOMALA T . Secret correlation in repeated games with imperfect monitoring[J]. Mathematics of Operations Research, 2007,32(2): 413-424. |
[26] | CABALLERO G P , HERNANDEZ G C , BRUNO C C . A game-theoretic model for two-party cryptographic protocols[C]// International Conference on Information Technology:Coding &Computing. 2004: 773-777. |
[27] | 田有亮, 彭长根, 马建峰 ,等. 安全协议的博弈论机制[J]. 计算机研究与发展, 2014,51(2): 344-352. |
TIAN Y L , PENG C G , MA J F ,et al. The game mechanism of se-curity protocol[J]. Computer Research and Development, 2014,51(2): 344-352. | |
[28] | 田有亮, 马建峰, 彭长根 ,等. 秘密共享体制的博弈论分析[J]. 电子学报, 2011,39(12): 2790-2795. |
TIAN Y L , MA J F , PENG C G ,et al. The game theory analysis of secret sharing schemes[J]. Acta Electronic Silica, 2011,39(12): 2790-2795. | |
[29] | 张国荣, 印鉴 . 基于博弈论的安全多方求和方法[J]. 计算机应用研究, 2009,26(4): 1497-1499. |
ZHANG G R , YIN J . The methods of secure sum based on game the-ory[J]. Application Research of Computers, 2009,26(4): 1497-1499. | |
[30] | 罗喜召, 钱陪德, 朱艳琴 ,等. 防范秘密攻击的安全计算的博弈论实现[J]. 南京航空航天大学学报, 2012,44(1): 70-74. |
LUO X Z , QIAN P D , ZHU Y Q ,et al. The game theory realization of security computing in prevent secret attacks[J]. Journal of Nanjing University of Aeronautics and Astronautics, 2012,41(1): 70-74. | |
[31] | ALPCAN T , BACSAR T . An intrusion detection game with limited observations[J]. Proceedings of Int.symp.on Dynamic Games &Applications Sophia Antipolis, 2006,8137: 222-232. |
[32] | ALPCAN T,BASAR,TAMER , . A game theoretic approach to decision and analysis in network intrusion detec-tion[C]// Procceedings of the 42nd IEEE Conference on Decision and Control,Maui,HI. 2003: 2595-2600. |
[33] | ZHU Q , TEMBINE H , BASAR T . Network security configurations:A nonzero-sum stochastic game approach[C]// Proceedings of the American Control Conference. 2010: 1059-1064. |
[34] | AGAH A , DAS S K , BASU K ,et al. Intrusion detection in sensor networks:a non-cooperative game approach[C]// The 3rd IEEE In-ternational Symposium on Network Computing and Applications. 2004: 343-346. |
[35] | CHEN L , LENEUTRE J . A Game theoretical framework on intru-sion detection in heterogeneous networks[J]. IEEE Transactions on Information Forensics & Security, 2009,4(2): 165-178. |
[36] | 朱建明, RAGHUNATHAN S . 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009,32(4): 828-834. |
ZHU J M , RAGHUNATHAN S . The evaluation model of informa-tion security based on game theory[J]. Chinese Journal of Com-puters, 2009,32(4): 828-834. | |
[37] | 夏子超, 银鹰, 陈晓桦 . 入侵检测系统响应策略的进化博弈论分析[J]. 微计算机信息, 2009(33): 60-61. |
XIA Z C , YIN Y , CHEN X H . The evolutionary game theory analy-sis of intrusion detection system response strategy[J]. Microcom-puter Information, 2009(33): 60-61. | |
[38] | 赵柳榕, 梅姝娥, 仲伟俊 . 虚拟专用网和入侵检测系统最优配置策略的博弈分析[J]. 管理工程学报, 2014,28(4). |
ZHAO L R , MEI S E , ZHONG W J . The game theory analysis of virtual private network and the optimal allocation of intrusion de-tection system[J]. Journal of Industrial Engineering and Engineer-ing Management, 2014,28(4). | |
[39] | LIAO Q , LI Z , STRIEGEL A . Could firewall rules be public-a game theoretical perspective[J]. Security & Communication Net-works, 2012,5(2): 197-210. |
[40] | 周华, 周海军, 马建锋 . 基于博弈论的入侵容忍系统安全性分析模型[J]. 电子与信息学报, 2013(8): 1933-1939. |
ZHOU H , ZHOU H J , MA J F . Safety analysis model of intrusion tolerance system bossed on game theory[J]. Journal of Electronics Information Technology, 2013(8): 1933-1939. |
[1] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[2] | Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN. Post-quantum encryption technology based on BRLWE for internet of things [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 140-149. |
[3] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[4] | Bao ZHANG, Youliang TIAN, Sheng GAO. Global randomized consensus algorithm resist collusion attack based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 98-109. |
[5] | Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG. Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 157-167. |
[6] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[7] | Guyue LI, Aiqun HU. Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189. |
[8] | Yu ZHANG, Hailiang LI. RSA-based image recognizable adversarial attack method [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 40-48. |
[9] | Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN. Survey of code-based digital signatures [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 1-17. |
[10] | Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN. Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9. |
[11] | Zhen ZHOU, Debiao HE, Min LUO, Li LI. Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 64-76. |
[12] | ZHANG Huanguo,DU Ruiying. Introduction to cyberspace security discipline [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18. |
[13] | XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian. Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24. |
[14] | HU Aiqun,LI Guyue,PENG Linning,LI Tao. Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66. |
[15] | CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng. Construction of cyberspace security course system of comprehensive practice and graded customs clearance [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|