通信学报 ›› 2019, Vol. 40 ›› Issue (6): 51-65.doi: 10.11959/j.issn.1000-436x.2019121

• 学术论文 • 上一篇    下一篇

安全数据采集代理顽健部署策略研究

陈黎丽1,2,王震2,3,郭云川2,华佳烽1,2,姚宇超1,李凤华1,2,4()   

  1. 1 西安电子科技大学综合业务网络国家重点实验室,陕西 西安 710071
    2 中国科学院信息工程研究所第五研究室,北京 100093
    3 杭州电子科技大学网络空间安全学院,浙江 杭州 310018
    4 中国科学院大学网络空间安全学院,北京 100049
  • 修回日期:2019-03-24 出版日期:2019-06-25 发布日期:2019-07-04
  • 作者简介:陈黎丽(1985- ),女,甘肃天水人,西安电子科技大学博士生,主要研究方向为网络空间安全、攻防博弈。|王震(1984- ),男,山东聊城人,博士,中国科学院信息工程研究所在站博士后,杭州电子科技大学副研究员,主要研究方向为网络空间安全、博弈论。|郭云川(1976- ),男,四川营山人,博士,中国科学院信息工程研究所副研究员,主要研究方向为网络空间安全、访问控制。|华佳烽(1989- ),男,湖北浠水人,西安电子科技大学博士生,主要研究方向为信息安全、隐私保护。|姚宇超(1997- ),男,新疆库尔勒人,主要研究方向为网络与系统安全。|李凤华(1966- ),男,湖北浠水人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为网络与系统安全、信息保护、隐私计算。
  • 基金资助:
    国家重点研发计划基金资助项目(2016YFB0800700);国家重点研发计划基金资助项目(2016YFB0800702);国家自然科学基金资助项目(61672515);中国科学院大学生创新实践训练计划基金资助项目

Robust deployment strategy for security data collection agent

  1. 1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 School of Cyberspace,Hangzhou Dianzi University,Hangzhou 310018,China
    4 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2019-03-24 Online:2019-06-25 Published:2019-07-04
  • Supported by:
    The National Key Research and Development Project(2016YFB0800700);The National Key Research and Development Project(2016YFB0800702);The National Natural Science Foundation of China(61672515);Innovative Practice Project of College Students in Chinese Academy of Sciences

摘要:

随着“网络黑产”事件频繁发生,攻击者以“趋利”的思想来策略地发动针对性的攻击。现有网络监测系统缺少针对“策略式攻击”精准有效的监测策略。因此,在敌对环境中,如何优化部署采集代理获取更好的监测效果成为一个极为重要的课题。针对该问题,提出了一种顽健采集代理部署策略。首先,引入攻防博弈思想,对采集代理和威胁事件及其之间的关系进行度量,构建度量攻防博弈模型——MADG模型;然后,考虑传统精确求解算法无法求解该问题,利用目标函数的次模和非增的性质设计了顽健采集代理部署算法——RCD算法进行近似求解;最后,对RCD算法进行了验证。实验结果表明,所提模型和方法是可行有效的,且具有可扩展性。

关键词: 采集代理, 安全数据, 攻防博弈, 顽健性, 优化部署

Abstract:

With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.

Key words: collection agent, security data, defender-attacker game theory, robust, deployment strategy

中图分类号: 

No Suggested Reading articles found!