Skip to main content

2018 | OriginalPaper | Buchkapitel

Network Defense Decision-Making Method Based on Stochastic Differential Game Model

verfasst von : Shirui Huang, Hengwei Zhang, Jindong Wang, Jianming Huang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the actual network attack and defense, the attack-defense behaviors generally change dynamically and continuously. Besides, since kinds of random disturbance is inevitable, the evolution of network security state actually is random. To model and analyze network security problems more accurately, we used the Gaussian white noise to describe the random disturbance. Then from the perspective of real-time attack and defense, we characterized the random and continuous evolution of network security state referring to dynamic epidemical model and the Itó stochastic differential equations. Based on previous statements, the attack and defense stochastic differential game model was constructed, and the saddle point strategy for the game was proposed. Additionally, we designed an optimal defense strategy selection algorithm to achieve real-time selection of the optimal defense strategies in continuous and random attack-defense process, which has greater timeliness and accuracy. Finally, simulations demonstrated that the proposed model and method are valid, and we offered specific recommendations for network defense based on the experimental data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fang, B.-X.: A hierarchy model on the research fields of cyberspace security technology. Netw. Inf. Secur. 1(1), 1–6 (2015) Fang, B.-X.: A hierarchy model on the research fields of cyberspace security technology. Netw. Inf. Secur. 1(1), 1–6 (2015)
2.
Zurück zum Zitat Gordon, L., Loeb, M.: Budgeting process for information security expenditures. Commun. ACM 49(10), 121–125 (2016) Gordon, L., Loeb, M.: Budgeting process for information security expenditures. Commun. ACM 49(10), 121–125 (2016)
3.
Zurück zum Zitat Zhu, J.-M., Song, B., Huang, Q.-F.: Evolution game model of offensive-defense for network security based on system dynamics. J. Commun. 35(1), 54–61 (2014) Zhu, J.-M., Song, B., Huang, Q.-F.: Evolution game model of offensive-defense for network security based on system dynamics. J. Commun. 35(1), 54–61 (2014)
4.
Zurück zum Zitat White, J., Park, J.S., Kamhoua, C.A., Kwiat, K.A.: Game theoretic attack analysis in online social network (OSN) services. In: Proceedings of the 2014 International Conference on Social Networks Technology, San Diego, USA, pp. 1012–1019. IEEE Press (2015) White, J., Park, J.S., Kamhoua, C.A., Kwiat, K.A.: Game theoretic attack analysis in online social network (OSN) services. In: Proceedings of the 2014 International Conference on Social Networks Technology, San Diego, USA, pp. 1012–1019. IEEE Press (2015)
5.
Zurück zum Zitat Shordon, L., Miao, Q.: Network survivability analysis based on signaling game model. Multimed. Inf. Netw. Secur. 55(5), 199–204 (2016) Shordon, L., Miao, Q.: Network survivability analysis based on signaling game model. Multimed. Inf. Netw. Secur. 55(5), 199–204 (2016)
6.
Zurück zum Zitat Lin, W.-Q., Wang, Hui, Liu, J.-H.: Research on active defense technology in network security based on non-cooperative dynamic game theory. J. Comput. Res. Dev. 48(2), 306–316 (2014) Lin, W.-Q., Wang, Hui, Liu, J.-H.: Research on active defense technology in network security based on non-cooperative dynamic game theory. J. Comput. Res. Dev. 48(2), 306–316 (2014)
7.
Zurück zum Zitat Zhang, H.-W., Yu, D.-K.: Network security threat assessment based on signaling game. J. Xidian Univ. 43(3), 137–143 (2016) Zhang, H.-W., Yu, D.-K.: Network security threat assessment based on signaling game. J. Xidian Univ. 43(3), 137–143 (2016)
8.
Zurück zum Zitat Yeung, D.W.K., Petrosyan, L.A.: Differential Games Theory. Springer Press, New York (2014)MATH Yeung, D.W.K., Petrosyan, L.A.: Differential Games Theory. Springer Press, New York (2014)MATH
9.
Zurück zum Zitat Jiang, W., Fang, B.-X., Tian, Z.-H.: Research on defense strategies selection based on attack-defense stochastic game model. J. Comput. Res. Dev. 47(10), 1714–1723 (2014) Jiang, W., Fang, B.-X., Tian, Z.-H.: Research on defense strategies selection based on attack-defense stochastic game model. J. Comput. Res. Dev. 47(10), 1714–1723 (2014)
10.
Zurück zum Zitat Wang, Y.-Z., Lin, C., Cheng, X.-Q., Fang, B.-X.: Evolutionary game model and analysis methods for network group behavior. J. Comput. Sci. Technol. 38(2), 282–300 (2014)MathSciNet Wang, Y.-Z., Lin, C., Cheng, X.-Q., Fang, B.-X.: Evolutionary game model and analysis methods for network group behavior. J. Comput. Sci. Technol. 38(2), 282–300 (2014)MathSciNet
11.
Zurück zum Zitat Nilim, A., Ghaoui, L.E.: Robust control of Markov decision processes with uncertain transition matrices. Oper. Res. 53(5), 780–798 (2016)MathSciNetCrossRef Nilim, A., Ghaoui, L.E.: Robust control of Markov decision processes with uncertain transition matrices. Oper. Res. 53(5), 780–798 (2016)MathSciNetCrossRef
12.
Zurück zum Zitat Chun-lei, W., Qing, M., Yi-qi, D.: Network survivability analysis based on stochastic game model. Multimed. Inf. Netw. Secur. 55(10), 199–204 (2015) Chun-lei, W., Qing, M., Yi-qi, D.: Network survivability analysis based on stochastic game model. Multimed. Inf. Netw. Secur. 55(10), 199–204 (2015)
13.
Zurück zum Zitat Yu, M., Liu, C., Qiu, X.-L., Zhao, S.: Modelling and analysis of phishing attack using stochastic game. Cybersp. Technol. 46(3), 300–305 (2016) Yu, M., Liu, C., Qiu, X.-L., Zhao, S.: Modelling and analysis of phishing attack using stochastic game. Cybersp. Technol. 46(3), 300–305 (2016)
14.
Zurück zum Zitat Zhang, H.-W., Wang, J.-D., Li, T.: Defense policies selection method based on attack-defense signaling game model. J. Commun. 37(5), 32–43 (2016) Zhang, H.-W., Wang, J.-D., Li, T.: Defense policies selection method based on attack-defense signaling game model. J. Commun. 37(5), 32–43 (2016)
16.
Zurück zum Zitat Shen, S.G., Li, Y., Xu, H.Y.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math Appl. 62(6), 2404–2416 (2015)MathSciNetCrossRef Shen, S.G., Li, Y., Xu, H.Y.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math Appl. 62(6), 2404–2416 (2015)MathSciNetCrossRef
17.
Zurück zum Zitat Dadsk, A.: Preventing DDoS attacks in wireless sensor networks: a repeated game theory approach. ACM Trans. Inf. Syst. Secur. 13(2), 145–153 (2015) Dadsk, A.: Preventing DDoS attacks in wireless sensor networks: a repeated game theory approach. ACM Trans. Inf. Syst. Secur. 13(2), 145–153 (2015)
18.
Zurück zum Zitat Zhang, H.-W., Li, T.: Optimal active defense based on multi-stage attack-defense signaling game. Acta electron. Sin. 45(2), 431–439 (2017)MathSciNet Zhang, H.-W., Li, T.: Optimal active defense based on multi-stage attack-defense signaling game. Acta electron. Sin. 45(2), 431–439 (2017)MathSciNet
19.
Zurück zum Zitat Zhuang, W.-Y.: Study on Emergency Decision Making of Major Projects Based on Dynamic Differential Game Theory. School of Mathematics, Shandong University, Jinan (2014) Zhuang, W.-Y.: Study on Emergency Decision Making of Major Projects Based on Dynamic Differential Game Theory. School of Mathematics, Shandong University, Jinan (2014)
20.
Zurück zum Zitat Moore, D., Shannon, C., Voelker, G.M.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of the 22’th International Conference of the IEEE Computer and Communications Societies, pp. 169–179. IEEE Press, Houston (2015) Moore, D., Shannon, C., Voelker, G.M.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of the 22’th International Conference of the IEEE Computer and Communications Societies, pp. 169–179. IEEE Press, Houston (2015)
21.
Zurück zum Zitat Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: CSI/FBI computer crime and security survey. In: Proceedings of the 2015 Computer Security Institute, pp. 48–64. IEEE Press, San Francisco (2015) Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: CSI/FBI computer crime and security survey. In: Proceedings of the 2015 Computer Security Institute, pp. 48–64. IEEE Press, San Francisco (2015)
Metadaten
Titel
Network Defense Decision-Making Method Based on Stochastic Differential Game Model
verfasst von
Shirui Huang
Hengwei Zhang
Jindong Wang
Jianming Huang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00018-9_44