通信学报 ›› 2017, Vol. 38 ›› Issue (1): 168-176.doi: 10.11959/j.issn.1000-436x.2017019

• 学术通信 • 上一篇    下一篇

基于攻防演化博弈模型的防御策略选取方法

黄健明1,2,张恒巍1,2,王晋东1,2,黄世锐1,2   

  1. 1 信息工程大学,河南 郑州 450001
    2 数学工程与先进计算国家重点实验室,河南 郑州 450001
  • 修回日期:2016-09-10 出版日期:2017-01-01 发布日期:2017-01-23
  • 作者简介:黄健明(1992-),男,湖南张家界人,信息工程大学硕士生,主要研究方向为网络安全主动防御。|张恒巍(1978-),男,河南洛阳人,博士,信息工程大学讲师,主要研究方向为网络安全行为分析、信息安全风险评估。|王晋东(1966-),男,山西洪桐人,信息工程大学教授,主要研究方向为网络与信息安全、云资源管理。|黄世锐(1994-),男,广东汕头人,信息工程大学硕士生,主要研究方向为网络安全预警与预测。
  • 基金资助:
    国家自然科学基金资助项目(61303074);国家自然科学基金资助项目(61309013);河南省科技计划基金资助项目(12210231003);河南省科技计划基金资助项目(13210231002)

Defense strategies selection based on attack-defense evolutionary game model

Jian-ming HUANG1,2,Heng-wei ZHANG1,2,Jin-dong WANG1,2,Shi-rui HUANG1,2   

  1. 1 Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China
  • Revised:2016-09-10 Online:2017-01-01 Published:2017-01-23
  • Supported by:
    The National Natural Science Foundation of China(61303074);The National Natural Science Foundation of China(61309013);Henan Science and Technol-ogy Research Project(12210231003);Henan Science and Technol-ogy Research Project(13210231002)

摘要:

当前运用博弈理论的网络安全研究方法大多采用完全理性假设,与实际情况并不相符。从网络攻防对抗的有限理性约束出发,基于非合作演化博弈理论,构建攻防演化博弈模型,提出演化稳定均衡的求解方法。在分析演化稳定策略的基础上,设计了最优防御策略选取算法。通过仿真实验验证了所提模型和方法的有效性,并且分析、总结了有限理性限制下攻防行为的演化规律。

关键词: 网络攻防, 有限理性, 演化博弈, 演化稳定策略, 最优防御策略

Abstract:

Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.

Key words: network attack-defense, bounded rationality, evolutionary game, evolutionary stable strategy, optimal de-fense strategy

中图分类号: 

No Suggested Reading articles found!