首页 | 官方网站   微博 | 高级检索  
     

Markov微分博弈模型及其在网络安全中的应用
引用本文:张恒巍,黄世锐. Markov微分博弈模型及其在网络安全中的应用[J]. 电子学报, 2019, 47(3): 606-612. DOI: 10.3969/j.issn.0372-2112.2019.03.013
作者姓名:张恒巍  黄世锐
作者单位:信息工程大学三院,河南郑州450001;信息保障技术重点实验室,北京100093;信息工程大学三院,河南郑州,450001
基金项目:国家自然科学基金;国家自然科学基金;河南省科技攻关计划;信息保障技术重点实验室开放基金
摘    要:当前基于博弈理论的网络安全研究成果难以应用于实时、连续、随机对抗的网络攻防过程.本文针对网络安全防御的实时性和网络状态变化的随机性,基于动态、实时对抗的视角分析攻防行为,在结合微分博弈模型和Markov决策方法的基础上进行扩展,构建Markov攻防微分博弈模型,分析具有多个阶段且每阶段持续时间较短的攻防过程;提出多阶段博弈均衡解计算方法,设计多阶段最优防御策略选取算法.仿真实验结果表明,模型和算法有效且可行.

关 键 词:网络安全  网络攻防  博弈论  微分博弈  Markov决策  网络防御  攻防行为分析  最优防御策略
收稿时间:2017-09-07

Markov Differential Game Model and Its Application in Network Security
ZHANG Heng-wei,HUANG Shi-rui. Markov Differential Game Model and Its Application in Network Security[J]. Acta Electronica Sinica, 2019, 47(3): 606-612. DOI: 10.3969/j.issn.0372-2112.2019.03.013
Authors:ZHANG Heng-wei  HUANG Shi-rui
Affiliation:1. The Third Institute, Information Engineering University, Zhengzhou, Henan 450001, China;2. Science and Technology on Information Assurance Laboratory, Beijing 100093, China
Abstract:The current research of network security based on game theory fails to analyze the real-time,continuous,and random network attack and defense process.For the randomness of security states and the real-time character of network defense decision-making,we analyzed the network attack and defense behaviors from the view of dynamic and real-time confrontation.Then we combined and extended the differential game model and Markov decision-making method.On these basis,a Markov attack-defense differential game model is constructed,which can be adopted to analyze the multi-stage attack and defense process with short duration in each stage.Besides,a multi-stage game equilibrium solution is proposed,and an optimal defense strategy selection algorithm is designed.Finally,the experiments demonstrate that the model and method proposed in this paper are valid.
Keywords:network security  network attack and defense  game theory  differential game  Markov decision-making  network defense  attack-defense analysis  optimal defense strategies  
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号