网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (1): 1-14.doi: 10.11959/j.issn.2096-109x.2021089
• 综述 • 下一篇
刘小虎, 张恒巍, 马军强, 张玉臣, 谭晶磊
修回日期:
2021-03-15
出版日期:
2022-02-15
发布日期:
2022-02-01
作者简介:
刘小虎(1989− ),男,河南太康人,博士,信息工程大学副教授,主要研究方向为网络攻防博弈基金资助:
Xiaohu LIU, Hengwei ZHANG, Junqiang MA, Yuchen ZHANG, Jinglei TAN
Revised:
2021-03-15
Online:
2022-02-15
Published:
2022-02-01
Supported by:
摘要:
博弈论研究冲突对抗条件下最优决策问题,是网络空间安全的基础理论之一,能够为解决网络防御决策问题提供理论依据。提炼网络攻防所具备的目标对立、策略依存、关系非合作、信息不完备、动态演化和利益驱动 6 个方面博弈特征。在理性局中人假设和资源有限性假设的基础上,采用攻防局中人、攻防策略集、攻防动作集、攻防信息集和攻防收益形式化定义了五元组网络攻防博弈模型,分析了博弈均衡的存在条件,总结出基于攻防博弈模型的网络防御决策过程。梳理分析了基于完全信息静态博弈、完全信息动态博弈、不完全信息静态博弈、不完全信息动态博弈、演化博弈、微分博弈、时间博弈和随机博弈共8种不同类型博弈模型的网络防御决策方法的适用场景,综述其研究思路,给出基于不同类型博弈模型的网络防御决策方法的优缺点。总结基于攻防博弈的网络防御决策方法的发展过程,说明防御决策方法具备的优势特点;指出研究过程中面临着博弈建模考虑因素与模型复杂度的关系,博弈推理对信息和数据的依赖性,博弈模型的泛化性和迁移性3个问题;并从规范策略的描述机制、优化收益的计算方法以及与其他网络安全技术相互融合3个方面展望了下一步研究方向,说明需要重点解决的问题。
中图分类号:
刘小虎, 张恒巍, 马军强, 张玉臣, 谭晶磊. 基于攻防博弈的网络防御决策方法研究综述[J]. 网络与信息安全学报, 2022, 8(1): 1-14.
Xiaohu LIU, Hengwei ZHANG, Junqiang MA, Yuchen ZHANG, Jinglei TAN. Research review of network defense decision-making methods based on attack and defense game[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 1-14.
[1] | LI X T . Decision making of optimal investment in information security for complementary enterprises based on game theory[J]. Technology Analysis & Strategic Management, 2021,33(7): 755-769. |
[2] | AGGARWAL P , MOISAN F , GONZALEZ C ,et al. Learning about the effects of alert uncertainty in attack and defend decisions via cognitive modeling[J]. Human Factors:the Journal of the Human Factors and Ergonomics Society, 2020:001872082094542. |
[3] | SHEKARIAN E , FLAPPER S D . Analyzing the structure of closed-loop supply chains:a game theory perspective[J]. Sustainability, 2021,13(3): 1397. |
[4] | XIAO Y , PENG Q , XU W T ,et al. Production-use water pricing and corporate water use in China:an evolutionary game theory model[J]. Mathematical Problems in Engineering,2021, 2021:6622064. |
[5] | CHEUNG K F , BELL M G H . Attacker-defender model against quantal response adversaries for cyber security in logistics management:an introductory study[J]. European Journal of Operational Research, 2021,291(2): 471-481. |
[6] | ALSABBAGH A , WU B , MA C B . Distributed electric vehicles charging management considering time anxiety and customer behaviors[J]. IEEE Transactions on Industrial Informatics, 2021,17(4): 2422-2431. |
[7] | GARCIA E , CASBEER D W , PACHTER M . Design and analysis of state-feedback optimal strategies for the differential game of active defense[J]. IEEE Transactions on Automatic Control, 2018,64(2): 553-568. |
[8] | 张焕国, 杜瑞颖 . 网络空间安全学科简论[J]. 网络与信息安全学报, 2019,5(3): 4-18. |
ZHANG H G , DU R Y . Introduction to cyberspace security discipline[J]. Chinese Journal of Network and Information Security, 2019,5(3): 4-18. | |
[9] | LIANG X N , XIAO Y . Game theory for network security[J]. IEEE Communications Surveys & Tutorials, 2013,15(1): 472-486. |
[10] | WANG Y , WANG Y J , LIU J ,et al. A survey of game theoretic methods for cyber security[C]// Proceedings of 2016 IEEE First International Conference on Data Science in Cyberspace. Piscataway:IEEE Press, 2016: 631-636. |
[11] | MANSHAEI M H , ZHU Q Y , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2013,45(3): 1-39. |
[12] | ZHU Q Y , RASS S . Game theory meets network security:a tutorial[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018: 2163-2165. |
[13] | ETESAMI S R , BA?AR T , . Dynamic games in cyber-physical security:an overview[J]. Dynamic Games and Applications, 2019,9(4): 884-913. |
[14] | YE D Y , ZHU T Q , SHEN S ,et al. A differentially private game theoretic approach for deceiving cyber adversaries[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 569-584. |
[15] | DAHIYA A , GUPTA B B . A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense[J]. Future Generation Computer Systems, 2021,117: 193-204. |
[16] | DO C T , TRAN N H , HONG C ,et al. Game theory for cyber security and privacy[J]. ACM Computing Surveys, 2018,50(2): 1-37. |
[17] | KUMAR B , BHUYAN B . Using game theory to model DoS attack and defence[J]. Sādhanā, 2019,44(12): 1-12. |
[18] | MERRICK K , HARDHIENATA M , SHAFI K ,et al. A survey of game theoretic approaches to modelling decision-making in information warfare scenarios[J]. Future Internet, 2016,8(3): 34. |
[19] | PENG R , WU D , SUN M Y ,et al. An attack-defense game on interdependent networks[J]. Journal of the Operational Research Society, 2021,72(10): 2331-2341. |
[20] | ZHANG H W , JIANG L , HUANG S R ,et al. Attack-defense differential game model for network defense strategy selection[J]. IEEE Access, 2019,7: 50618-50629. |
[21] | 朱建明, 王秦 . 基于博弈论的网络空间安全若干问题分析[J]. 网络与信息安全学报, 2015,1(1): 43-49. |
ZHU J M , WANG Q . Analysis of cyberspace security based on game theory[J]. Chinese Journal of Network and Information Security, 2015,1(1): 43-49. | |
[22] | JIANG W , FANG B X , ZHANG H L ,et al. Optimal network security strengthening using attack-defense game model[C]// Proceedings of 2009 Sixth International Conference on Information Technology:New Generations. Piscataway:IEEE Press, 2009: 475-480. |
[23] | 屈蕾蕾, 肖若瑾, 石文昌 ,等. 涌现视角下的网络空间安全挑战[J]. 计算机研究与发展, 2020,57(4): 803-823. |
QU L L , XIAO R J , SHI W C ,et al. Cybersecurity challenges from the perspective of emergence[J]. Journal of Computer Research and Development, 2020,57(4): 803-823. | |
[24] | DUFWENBERG M . Game theory[J]. WIREs Cognitive Science, 2011,2(2): 167-173. |
[25] | ZHANG H W , LI T , WANG J D ,et al. Optimal active defence using dynamic multi-stage signalling game[J]. China Communications, 2015,12(S2): 114-122. |
[26] | 刘景玮, 刘京菊, 陆余良 ,等. 基于网络攻防博弈模型的最优防御策略选取方法[J]. 计算机科学, 2018,45(6): 117-123. |
LIU J W , LIU J J , LU Y L ,et al. Optimal defense strategy selection method based on network attack-defense game model[J]. Computer Science, 2018,45(6): 117-123. | |
[27] | 刘小虎, 张恒巍, 张玉臣 ,等. 基于博弈模型与 NetLogo 仿真的网络攻防态势研究[J]. 系统仿真学报, 2020,32(10): 1918-1926. |
LIU X H , ZHANG H W , ZHANG Y C ,et al. Research on network attack and defense situation based on game theory model and NetLogo simulation[J]. Journal of System Simulation, 2020,32(10): 1918-1926. | |
[28] | GILL K S , SAXENA S , SHARMA A . GTM-CSec:game theoretic model for cloud security based on IDS and honeypot[J]. Computers& Security, 2020,92:101732. |
[29] | MISHRA B , SMIRNOVA I . Optimal configuration of intrusion detection systems[J]. Information Technology and Management, 2021,22(4): 231-244. |
[30] | WEILL C , OLIVEREAU A , ZEGHLACHE D ,et al. Configuration of the Detection Function in a Distributed IDS Using Game Theory[M]// 2020 23rd Conference on Innovation In Clouds,Internet And Networks And Workshops.New York; IEEE. 2020. 210-215. |
[31] | DIAMANTOULAKIS P , DALAMAGKAS C , RADOGLOU-GRAMMATIKIS P , ,et al. Game theoretic honeypot deployment in smart grid[J]. Sensors (Basel,Switzerland), 2020,20(15): 4199. |
[32] | TIAN W , JI X P , LIU W W ,et al. Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems[J]. ETRI Journal, 2019,41(5): 585-598. |
[33] | LI Y , SHI L Y , FENG H J . A game-theoretic analysis for distributed honeypots[J]. Future Internet, 2019,11(3): 65. |
[34] | SAMIR M , AZAB M , SAMIR E . SD-CPC:SDN controller placement camouflage based on stochastic game for moving-target defense[J]. Computer Communications, 2021,168: 75-92. |
[35] | WANG S L , SHI H W , HU Q ,et al. Moving target defense for Internet of Things based on the zero-determinant theory[J]. IEEE Internet of Things Journal, 2020,7(1): 661-668. |
[36] | WRIGHT M , VENKATESAN S , ALBANESE M ,et al. Moving target defense against DDoS attacks:an empirical game-theoretic analysis[C]// Proceedings of the 2016 ACM Workshop on Moving Target Defense. 2016: 93-104. |
[37] | CAI G L , WANG B S , XING Q Q . Game theoretic analysis for the mechanism of moving target defense[J]. Frontiers of Information Technology & Electronic Engineering, 2017,18(12): 2017-2034. |
[38] | PAWLICK J , COLBERT E , ZHU Q Y . Analysis of leaky deception for network security using signaling games with evidence[R]. New York University, 2018. |
[39] | ZENG C Y , REN B A , LIU H F ,et al. Applying the Bayesian stackelberg active deception game for securing infrastructure networks[J]. Entropy, 2019,21(9): 909. |
[40] | 张维迎 . 博弈论与信息经济学[M]. 上海: 格致出版社, 2012. |
ZHANG W Y . Game theory and information economics[M]. Shanghai: Gezhi publishing house, 2012. | |
[41] | 姜伟, 方滨兴, 田志宏 ,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,32(4): 817-827. |
JIANG W , FANG B X , TIAN Z H ,et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009,32(4): 817-827. | |
[42] | LIU P , ZANG W Y , YU M . Incentive-based modeling and inference of attacker intent,objectives,and strategies[J]. ACM Transactions on Information and System Security, 2005,8(1): 78-118. |
[43] | 王增光, 卢昱, 李玺 . 基于攻防博弈的军事信息网络安全风险评估[J]. 军事运筹与系统工程, 2019,33(2): 35-40,47. |
WANG Z G , LU Y , LI X . Military information network security risk assessment based on attack defense game[J]. Military Operations Research and Systems Engineering, 2019,33(2): 35-40,47. | |
[44] | 陈永强, 付钰, 吴晓平 . 基于非零和攻防博弈模型的主动防御策略选取方法[J]. 计算机应用, 2013,33(5): 1347-1349,1352. |
CHEN Y Q , FU Y , WU X P . Active defense strategy selection based on non-zero-sum attack-defense game model[J]. Journal of Computer Applications, 2013,33(5): 1347-1349,1352. | |
[45] | AGAH A , DAS S K . Preventing DoS attacks in wireless sensor networks:a repeated game theory approach[J]. International Journal of Network Security, 2007,5(2): 145-153. |
[46] | 林旺群, 王慧, 刘家红 ,等. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011,48(2): 306-316. |
LIN W Q , WANG H , LIU J H ,et al. Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011,48(2): 306-316. | |
[47] | 孙骞, 高岭, 刘涛 ,等. 基于非零和博弈的多路径组合攻击防御决策方法[J]. 西北大学学报(自然科学版), 2019,49(3): 343-350. |
SUN Q , GAO L , LIU T ,et al. Defense decision-making method for multi-path combined attack based on non-zero-sum game[J]. Journal of Northwest University (Natural Science Edition), 2019,49(3): 343-350. | |
[48] | 王晋东, 余定坤, 张恒巍 ,等. 静态贝叶斯博弈主动防御策略选取方法[J]. 西安电子科技大学学报, 2016,43(1): 144-150. |
WANG J D , YU D K , ZHANG H W ,et al. Active defense strategy selection based on the static Bayesian game[J]. Journal of Xidian University, 2016,43(1): 144-150. | |
[49] | 陈永强, 吴晓平, 付钰 ,等. 基于模糊静态贝叶斯博弈的网络主动防御策略选取[J]. 计算机应用研究, 2015,32(3): 887-889,899. |
CHEN Y Q , WU X P , FU Y ,et al. Active defense strategy selection of network based on fuzzy static Bayesian game model[J]. Application Research of Computers, 2015,32(3): 887-889,899. | |
[50] | 余定坤, 王晋东, 张恒巍 ,等. 基于静态贝叶斯博弈的风险评估方法研究[J]. 计算机工程与科学, 2015,37(6): 1079-1086. |
YU D K , WANG J D , ZHANG H W ,et al. Risk assessment selection based on static Bayesian game[J]. Computer Engineering &Science, 2015,37(6): 1079-1086. | |
[51] | 刘玉岭, 冯登国, 吴丽辉 ,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3): 712-723. |
LIU Y L , FENG D G , WU L H ,et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012,23(3): 712-723. | |
[52] | 黄万伟, 袁博, 王苏南 ,等. 基于非零和信号博弈的主动防御模型[J]. 郑州大学学报(工学版), 2022,43(1): 90-96. |
HUANG W W , YUAN B , WANG S N ,et al. Proactive defense model based on non-zero-sum signal game[J]. Journal of Zhengzhou University (Engineering Science), 2022,43(1): 90-96. | |
[53] | 王增光, 卢昱, 李玺 . 多阶段信号博弈的装备保障信息网络主动防御[J]. 火力与指挥控制, 2020,45(12): 142-148. |
WANG Z G , LU Y , LI X . Research on active defense of equipment support information network based on multi-stage signaling game[J]. Fire Control & Command Control, 2020,45(12): 142-148. | |
[54] | 李凌书, 邬江兴, 曾威 ,等. 容器云中基于信号博弈的容器迁移与蜜罐部署策略[J]. 网络与信息安全学报, 2022,8. |
LI L S , WU J X , ZENG W ,et al. Strategy of container migration and honeypot deployment based on signal game in cloud environ ment[J]. Chinese Journal of Network and Information Security, 2022,8. | |
[55] | 胡永进, 马骏, 郭渊博 ,等. 基于多阶段网络欺骗博弈的主动防御研究[J]. 通信学报, 2020,41(8): 32-42. |
HU Y J , MA J , GUO Y B ,et al. Research on active defense based on multi-stage cyber deception game[J]. Journal on Communications, 2020,41(8): 32-42. | |
[56] | 胡永进, 马骏, 郭渊博 . 基于博弈论的网络欺骗研究[J]. 通信学报, 2018,39(S2): 9-18. |
HU Y J , MA J , GUO Y B . Research on cyber deception based on game theory[J]. Journal on Communications, 2018,39(S2): 9-18. | |
[57] | YANG Y , CHE B C , ZENG Y ,et al. MAIAD:a multistage asymmetric information attack and defense model based on evolutionary game theory[J]. Symmetry, 2019,11(2): 215. |
[58] | CHEN X Y , LIU X T , ZHANG L ,et al. Optimal defense strategy selection for spear-phishing attack based on a multistage signaling game[J]. IEEE Access, 2019,7: 19907-19921. |
[59] | LIU X H , ZHANG H W , ZHANG Y C ,et al. Active defense strategy selection method based on two-way signaling game[J]. Security and Communication Networks,2019, 2019:1362964. |
[60] | AYDEGER A , MANSHAEI M H , RAHMAN M A ,et al. Strategic defense against stealthy link flooding attacks:a signaling game approach[J]. IEEE Transactions on Network Science and Engineering, 2021,8(1): 751-764. |
[61] | PAWLICK J , COLBERT E , ZHU Q Y . Modeling and analysis of leaky deception using signaling games with evidence[J]. IEEE Transactions on Information Forensics and Security, 2019,14(7): 1871-1886. |
[62] | PAWLICK J , ZHU Q Y . Deception by design:evidence-based signaling games for network defense[EB/OL]. 2015:arXiv:1503.05458[cs.CR]. |
[63] | 蒋侣, 张恒巍, 王晋东 . 基于多阶段 Markov 信号博弈的移动目标防御最优决策方法[J]. 电子学报, 2021,49(3): 527-535. |
JIANG L , ZHANG H W , WANG J D . A Markov signaling game-theoretic approach to moving target defense strategy selection[J]. Acta Electronica Sinica, 2021,49(3): 527-535. | |
[64] | 张青青, 汤红波, 游伟 ,等. 基于演化博弈的NFV拟态防御架构动态调度策略[J]. 计算机工程, 2021. |
ZHANG Q Q , TANG H B , YOU W ,et al. Dynamic scheduling strategies of NFV mimic defense architecture based on evolutionary game[J]. Computer Engineering, 2021. | |
[65] | ALABDEL ABASS A A , XIAO L , MANDAYAM N B ,et al. Evolutionary game theoretic analysis of advanced persistent threats against cloud storage[J]. IEEE Access, 2017,5: 8482-8491. |
[66] | 黄健明, 张恒巍, 王晋东 ,等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017,38(1): 168-176. |
HUANG J M , ZHANG H W , WANG J D ,et al. Defense strategies selection based on attack-defense evolutionary game model[J]. Journal on Communications, 2017,38(1): 168-176. | |
[67] | 黄健明, 张恒巍 . 基于改进复制动态演化博弈模型的最优防御策略选取[J]. 通信学报, 2018,39(1): 170-182. |
HUANG J M , ZHANG H W . Improving replicator dynamic evolutionary game model for selecting optimal defense strategies[J]. Journal on Communications, 2018,39(1): 170-182. | |
[68] | HUANG J M , WANG J D , ZHANG H W ,et al. Network defense strategy selection based on best-response dynamic evolutionary game model[C]// Proceedings of 2017 IEEE 2nd Advanced Information Technology,Electronic and Automation Control Conference. Piscataway:IEEE Press, 2017: 2611-2615. |
[69] | SHI L Y , WANG X R , HOU H W . Research on optimization of array honeypot defense strategies based on evolutionary game theory[J]. Mathematics, 2021,9(8): 805. |
[70] | 张恒巍, 黄健明 . 基于Markov演化博弈的网络防御策略选取方法[J]. 电子学报, 2018,46(6): 1503-1509. |
ZHANG H W , HUANG J M . Network defense strategy selection method based on Markov evolutionary game[J]. Acta Electronica Sinica, 2018,46(6): 1503-1509. | |
[71] | HU H , LIU Y L , ZHANG H Q ,et al. Optimal network defense strategy selection based on incomplete information evolutionary game[J]. IEEE Access, 2018,6: 29806-29821. |
[72] | LIU X H , ZHANG H W , ZHANG Y C ,et al. Optimal network defense strategy selection method based on evolutionary network game[J]. Security and Communication Networks,2020, 2020:5381495. |
[73] | 张恒巍, 李涛, 黄世锐 . 基于攻防微分博弈的网络安全防御决策方法[J]. 电子学报, 2018,46(6): 1428-1435. |
ZHANG H W , LI T , HUANG S R . Network defense decision-making method based on attack-defense differential game[J]. Acta Electronica Sinica, 2018,46(6): 1428-1435. | |
[74] | 张恒巍, 黄世锐 . Markov 微分博弈模型及其在网络安全中的应用[J]. 电子学报, 2019,47(3): 606-612. |
ZHANG H W , HUANG S R . Markov differential game model and its application in network security[J]. Acta Electronica Sinica, 2019,47(3): 606-612. | |
[75] | HUANG S R , ZHANG H W , WANG J D ,et al. Network defense decision-making method based on stochastic differential game model[C]// Cloud Computing and Security, 2018: 504-516. |
[76] | 孙岩, 姬伟峰, 翁江 ,等. 基于微分博弈的移动目标防御最优策略[J]. 计算机研究与发展, 2021,58(8): 1789-1800. |
SUN Y , JI W F , WENG J ,et al. Optimal strategy of moving target defense based on differential game[J]. Journal of Computer Research and Development, 2021,58(8): 1789-1800. | |
[77] | DIJK M , JUELS A , OPREA A ,et al. FlipIt:the game of “stealthy takeover”[J]. Journal of Cryptology, 2013,26(4): 655-713. |
[78] | 丁绍虎, 齐宁, 郭义伟 . 基于M-FlipIt博弈模型的拟态防御策略评估[J]. 通信学报, 2020,41(7): 186-194. |
DING S H , QI N , GUO Y W . Evaluation of mimic defense strategy based on M-FlipIt game model[J]. Journal on Communications, 2020,41(7): 186-194. | |
[79] | 丁绍虎 . 信息通信网络中拟态防御机理与关键技术研究[D]. 郑州:信息工程大学, 2020. |
DING S H . Research on mimic defense mechanism and key technologies in information communication networks[D]. Zhengzhou:Information Engineering University, 2020. | |
[80] | LASZKA A , HORVATH G , FELEGYHAZI M ,et al. FlipThem:modeling targeted attacks with FlipIt for multiple resources[C]// Decision and Game Theory for Security, 2014: 175-194. |
[81] | 谭晶磊, 张恒巍, 张红旗 ,等. 基于 Markov 时间博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2020,41(1): 42-52. |
TAN J L , ZHANG H W , ZHANG H Q ,et al. Optimal strategy selection approach of moving target defense based on Markov time game[J]. Journal on Communications, 2020,41(1): 42-52. | |
[82] | TAN J L , ZHANG H W , ZHANG H Q ,et al. Optimal timing selection approach to moving target defense:a FlipIt attack-defense game model[J]. Security and Communication Networks,2020, 2020:3151495. |
[83] | MIURA H , KIMURA T , HIRATA K . Modeling of malware diffusion with the FLIPIT game[C]// Proceedings of 2020 IEEE International Conference on Consumer Electronics. 2020: 1-2. |
[84] | MERLEVEDE J , JOHNSON B , GROSSKLAGS J ,et al. Exponential discounting in security games of timing[J]. Journal of Cybersecurity, 2021,7(1). |
[85] | PAWLICK J , ZHU Q Y . Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control[J]. IEEE Transactions on Information Forensics and Security, 2017,12(12): 2906-2919. |
[86] | LYE K W , WING J M . Game strategies in network security[J]. International Journal of Information Security, 2005,4(1/2): 71-86. |
[87] | 王元卓, 林闯, 程学旗 ,等. 基于随机博弈模型的网络攻防量化分析方法[J]. 计算机学报, 2010,33(9): 1748-1762. |
WANG Y Z , LIN C , CHENG X Q ,et al. Analysis for network attack-defense based on stochastic game model[J]. Chinese Journal of Computers, 2010,33(9): 1748-1762. | |
[88] | WANG C L , MIAO Q , DAI Y Q . Network survivability analysis based on stochastic game model[C]// Proceedings of 2012 Fourth International Conference on Multimedia Information Networking and Security. Piscataway:IEEE Press, 2012: 99-104. |
[89] | 张红旗, 杨峻楠, 张传富 . 基于不完全信息随机博弈与Q-learning的防御决策方法[J]. 通信学报, 2018,39(8): 56-68. |
ZHANG H Q , YANG J N , ZHANG C F . Defense decision-making method based on incomplete information stochastic game and Q-learning[J]. Journal on Communications, 2018,39(8): 56-68. | |
[90] | 杨峻楠, 张红旗, 张传富 . 基于不完全信息随机博弈的防御决策方法[J]. 网络与信息安全学报, 2018,4(8): 12-20. |
YANG J N , ZHANG H Q , ZHANG C F . Defense decision-making method based on incomplete information stochastic game[J]. Chinese Journal of Network and Information Security, 2018,4(8): 12-20. | |
[91] | 杨峻楠, 张红旗, 张传富 . 基于随机博弈与改进 WoLF-PHC 的网络防御决策方法[J]. 计算机研究与发展, 2019,56(5): 942-954. |
YANG J N , ZHANG H Q , ZHANG C F . Network defense decision-making method based on stochastic game and improved WoLF-PHC[J]. Journal of Computer Research and Development, 2019,56(5): 942-954. |
[1] | 易杰, 曹腾飞, 郜帅, 黄建强. 车联网中基于攻防博弈的蜜罐防御及传输策略[J]. 网络与信息安全学报, 2022, 8(4): 157-167. |
[2] | 熊钢,葛雨玮,褚衍杰,曹卫权. 基于跨域协同的网络空间威胁预警模式[J]. 网络与信息安全学报, 2020, 6(6): 88-96. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|