Journal on Communications ›› 2019, Vol. 40 ›› Issue (6): 51-65.doi: 10.11959/j.issn.1000-436x.2019121

• Papers • Previous Articles     Next Articles

Robust deployment strategy for security data collection agent

  

  1. 1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 School of Cyberspace,Hangzhou Dianzi University,Hangzhou 310018,China
    4 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2019-03-24 Online:2019-06-25 Published:2019-07-04
  • Supported by:
    The National Key Research and Development Project(2016YFB0800700);The National Key Research and Development Project(2016YFB0800702);The National Natural Science Foundation of China(61672515);Innovative Practice Project of College Students in Chinese Academy of Sciences

Abstract:

With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.

Key words: collection agent, security data, defender-attacker game theory, robust, deployment strategy

CLC Number: 

No Suggested Reading articles found!