通信学报 ›› 2018, Vol. 39 ›› Issue (10): 143-154.doi: 10.11959/j.issn.1000-436x.2018223

• 学术通信 • 上一篇    下一篇

拟态防御马尔可夫博弈模型及防御策略选择

张兴明,顾泽宇,魏帅,沈剑良   

  1. 国家数字交换系统工程技术研究中心,河南 郑州 450002
  • 修回日期:2018-09-22 出版日期:2018-10-01 发布日期:2018-11-23
  • 作者简介:张兴明(1963-),男,河南新乡人,国家数字交换系统工程技术研究中心教授,主要研究方向为拟态安全、高性能计算等。|顾泽宇(1993-),男,辽宁沈阳人,国家数字交换系统工程技术研究中心硕士生,主要研究方向为网络主动防御、网络安全等。|魏帅(1984-),男,河南南阳人,博士,国家数字交换系统工程技术研究中心讲师,主要研究方向为拟态安全、嵌入式计算等。|沈剑良(1982-),男,浙江德清人,博士,国家数字交换系统工程技术研究中心讲师,主要研究方向为可重构计算等。
  • 基金资助:
    国家自然科学基金资助项目(61572520);国家自然科学基金资助项目(61521003);国家科技重大专项基金资助项目(2016ZX01012101)

Markov game modeling of mimic defense and defense strategy determination

Xingming ZHANG,Zeyu GU,Shuai WEI,Jianliang SHEN   

  1. National Digital Switching System Engineering &Technological R&D Center,Zhengzhou 450002,China
  • Revised:2018-09-22 Online:2018-10-01 Published:2018-11-23
  • Supported by:
    The National Natural Science Foundation of China(61572520);The National Natural Science Foundation of China(61521003);The National Science and Technology Major Project of China(2016ZX01012101)

摘要:

网络拟态防御通过冗余执行体动态性、多样性以及裁决反馈机制增强了主动防御顽健性,而对于其安全性评估尚缺少有效的分析模型,基于经典博弈模型无法满足于其多状态、动态性特点,不具有通用性等问题,提出拟态防御 Markov 博弈模型分析攻防状态间的转移关系以及安全可靠性度量方法,通过非线性规划算法计算攻防博弈均衡,以确定考虑防御代价的最佳防御策略。实验与多目标隐藏技术对比,结果表明拟态防御具有更高的防御效果,结合具体案例给出了针对利用系统漏洞攻击的具体攻防路径,验证了防御策略算法有效性。

关键词: 网络拟态防御, Markov博弈, 冗余执行体, 防御顽健性, 主动防御策略

Abstract:

Network mimic defense technology enhances the robustness of active defense through the redundancy,dynamic and diversity as well as the decision feedback mechanism.However,little work has been done for its security assessment and existing classic game models are not suitable for its dynamic characteristics and lack of universality.A Markov game model was proposed to analyze the transfer relationship between offensive and defensive status and the measurement method of safety and reliability of mimic defense,and calculated the offensive and defensive game equilibrium through non-linear programming algorithm to determine the best defensive strategy considering performance.Experiments give a comparison with the multi-target hiding technique and shows that the mimic defense has a higher defensive effect.Combining with the specific network case,the specific attack and defense path for the exploit of the system vulnerability is given and the effectiveness of the defense strategy algorithm is verified.

Key words: network mimic defense, Markov game, redundant execution units, defense robustness, active defense strategy

中图分类号: 

No Suggested Reading articles found!