Journal on Communications ›› 2020, Vol. 41 ›› Issue (1): 42-52.doi: 10.11959/j.issn.1000-436x.2020003
• Papers • Previous Articles Next Articles
Jinglei TAN1,2,Hengwei ZHANG1,Hongqi ZHANG1,2,Hui JIN1,2,Cheng LEI1,2
Revised:
2019-09-21
Online:
2020-01-25
Published:
2020-02-11
Supported by:
CLC Number:
Jinglei TAN,Hengwei ZHANG,Hongqi ZHANG,Hui JIN,Cheng LEI. Optimal strategy selection approach of moving target defense based on Markov time game[J]. Journal on Communications, 2020, 41(1): 42-52.
[1] | MITROPOULOS D , LOURIDAS P , POLYCHRONAKIS M ,et al. Defending against web application attacks:approaches,challenges and implications[J]. IEEE Transactions on Dependable and Secure Computing, 2017:1. |
[2] | ZHENG J , NAMIN A S . A survey on the moving target defense strategies:an architectural perspective[J]. Journal of Computer Science and Technology, 2019,34(1): 207-233. |
[3] | CAI G L , WANG B S , XING Q Q . Game theoretic analysis for the mechanism of moving target defense[J]. Frontiers of Information Technology & Electronic Engineering, 2017,18(12): 2017-2034. |
[4] | 姜伟, 方滨兴, 田志宏 . 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2013,32(4): 818-827. |
JIANG W , FANG B X , TIAN Z H . Defense strategies selection based on attack-defense game model[J]. Chinese Journal of Computers, 2013,47(12): 818-827. | |
[5] | 林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2013,48(2): 306-316. |
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2013,48(2): 306-316. | |
[6] | MANADHATA P K . Game theoretic approaches to attack surface shifting[M]. New York: SpringerPress, 2013: 1-13. |
[7] | VADLAMUDI S G , SENGUPTA S , TAGUINOD M ,et al. Moving target defense for web applications using Bayesian Stackelberg games[C]// The 2016 International Conference on Autonomous Agents& Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 2016: 1377-1378. |
[8] | LEI C , ZHANG H Q , WAN L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. Computer Communications, 2018,116: 184-199. |
[9] | MALEKI H , VALIZADEH M H , KOCH W ,et al. Markov modeling of moving target defense games[J]. Journal of Cryptology, 2016: 47-83. |
[10] | JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[J]. Springer Ebooks, 2011,54. |
[11] | LEI C , ZHANG H Q , WANG L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. 2018,116: 184-199. |
[12] | ZHENG J J , NAMIN A S . A survey on the moving target defense strategies:an architectural perspective[J]. Journal of Computer Science and Technology, 2019,34(1): 207-233. |
[13] | 谭晶磊, 张红旗, 雷程 ,等. 面向SDN的移动目标防御技术研究进展[J]. 网络与信息安全学报, 2018,4(7): 1-12. |
TAN J L , ZHANG H Q , LEI C ,et al. Research progress on moving target defense for SDN[J]. Chinese Journal of Network and Information Security, 2018,4(7): 1-12. | |
[14] | DIJK M V , ARI JUELS , ALINA OPREA ,et al. FlipIt:the game of“stealthy takeover”[J]. Journal of Cryptology, 2013,26(4): 655-713. |
[15] | ZHENG J , SIAMI NAMIN A . A Markov decision process to determine optimal policies in moving target[C]// The 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018: 2321-2323. |
[16] | 刘江, 张红旗, 刘艺 . 基于不完全信息动态博弈的动态目标防御最优策略选取研究[J]. 电子学报, 2018,46(1): 82-89. |
LIU J , ZHANG H Q , LIU Y . Research on optimal selection of moving target defense policy based on dynamic game with incomplete information[J]. Acta Electronica Sinica, 2018,46(1): 82-89. | |
[17] | LEI C , MA D H , ZHANG H Q . Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017,PP(99):1. |
[18] | BORKOVSKY R N , DORASZELSKI U , KRYUKOV Y . A user’ s guide to solving dynamic stochastic games using the homotopy method[J]. Operation Research, 2015,58(4): 1116-1132. |
[19] | CHEN M , SAAD W , YIN C . Virtual reality over wireless networks:quality-of-service model and learning-based resource management[J]. IEEE Transactions on Communications, 2018,66(11): 5621-5635. |
[20] | NILIM A , GHAOUI L E . Robust control of Markov decision processes with uncertain transition matrices[J]. Operations Research, 2016,53(5): 780-798. |
[21] | SULEIMAN R . On gamesmen and fair men:explaining fairness in non-cooperative bargaining games[J]. Royal Society Open Science, 2018,5(2):171709. |
[22] | MANADHATA P K . Game theoretic approaches to attack surface shifting[M]. New York: SpringerPress, 2013: 1-13. |
[23] | CLARK A , SUN K , BUSHNELL L ,et al. A game-theoretic approach to IP address randomization in decoy-based cyber defense[C]// International Conference on Decision and Game Theory for Security. Springer, 2015: 3-21. |
[1] | Xiaoyu XU, Hao HU, Hongqi ZHANG, Yuling LIU. Random routing defense method based on deep deterministic policy gradient [J]. Journal on Communications, 2021, 42(6): 41-51. |
[2] | Tong WANG, Shan GAO, Huiwen GONG, Bo SUN. Research on forecast and recommendation technology of taxi passengers based on time-varying Markov decision process [J]. Journal on Communications, 2021, 42(2): 37-51. |
[3] | Fucai CHEN,Weizhen HE,Guozhen CHENG,Shumin HUO,Dacheng ZHOU. Design of key technologies for intranet dynamic gateway based on DPDK [J]. Journal on Communications, 2020, 41(6): 139-151. |
[4] | JIANG Lyu,ZHANG Hengwei,WANG Jindong. Optimal strategy selection method for moving target defense based on signaling game [J]. Journal on Communications, 2019, 40(6): 128-137. |
[5] | Jiang ZHU,Tingting WANG,Yonghui SONG,Yali LIU. Transmission scheduling scheme based on deep Q learning in wireless network [J]. Journal on Communications, 2018, 39(4): 35-44. |
[6] | Duohe MA,Qiong LI,Dongdai LIN. Moving target defense against network eavesdropping attack using POF [J]. Journal on Communications, 2018, 39(2): 73-87. |
[7] | Cheng LEI,Duo-he MA,Hong-qi ZHANG,Qi HAN,Ying-jie YANG. Network moving target defense technique based on optimal forwarding path migration [J]. Journal on Communications, 2017, 38(3): 133-143. |
[8] | Yi-xun HU,Kang-feng ZHENG,Yi-xian YANG,Xin-xin NIU. Moving target defense solution on network layer based on OpenFlow [J]. Journal on Communications, 2017, 38(10): 102-112. |
[9] | Cheng LEI,Duo-he MA,Hong-qi ZHANG,Ying-jie YANG,Miao WANG. Performance assessment approach based on change-point detection for network moving target defense [J]. Journal on Communications, 2017, 38(1): 126-140. |
[10] | Shao-feng GENG,Yong-heng WANG,Ren-fa LI,Jia ZHANG. Research of proactive complex event processing method [J]. Journal on Communications, 2016, 37(9): 111-120. |
[11] | You-liang TIAN,Xue-mei WANG,Lin-fang LIU. Rational secret sharing scheme based on Markov decision [J]. Journal on Communications, 2015, 36(9): 222-229. |
[12] | Bo TIAN,Yi-min YANG,Shu-ting CAI. Semi-Markov decision process based congestion control algorithm for video transmission [J]. Journal on Communications, 2014, 35(8): 154-161. |
[13] | . Semi-Markov decision process based congestion control algorithm for video transmission [J]. Journal on Communications, 2014, 35(8): 19-161. |
[14] | Jun YU,Quan LIU,Qi-ming FU,Hong-kun SUN,Gui-xing CHEN. Bayesian Q learning method with Dyna architecture and prioritized sweeping [J]. Journal on Communications, 2013, 34(11): 129-139. |
[15] | . Bayesian Q learning method with Dyna architecture and prioritized sweeping [J]. Journal on Communications, 2013, 34(11): 15-139. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|