Username   Password       Forgot your password?  Forgot your username? 


Defensive Strategy Selection based on Attack-Defense Game Model in Network Security

Volume 14, Number 11, November 2018, pp. 2633-2642
DOI: 10.23940/ijpe.18.11.p9.26332642

Ningbin Zhang

School of Information Engineering of Xian University, Xian, 710062, China

(Submitted on August 2, 2018; Revised on September 15, 2018; Accepted on October 11, 2018)


Security analysis and attack-defense modeling are effective methods to identify the vulnerabilities of information systems for proactive defense. The attack graph model reflects only attack actions and system state changes, without considering the perspective of the defenders. To assess the network information system and comprehensively show attack and defense strategies and their cost, a defense graph model is proposed. Compared with the attack graph, the model makes some improvements. The defense graph will be mapped to the attack and defense game model, in order to provide a basis for active defense policy decision. Moreover, a generation algorithm of defense graph is proposed. A representative example is provided to illustrate our models and demonstrate the high efficiency of the algorithm.


References: 12

                  1. Y. Fu, Y. Q. Chen, and S. Y. Wu, “Selection of Network Attack Defense Strategy based on a Stochastic Game Model,” Journal of Beijing University of Posts and Telecommunications, Vol. S1, pp. 35-39, 2014
                  2. Y. Q. Chen, “Based on Fuzzy Static Bayesian Game Active Network Defense Strategy Selection,” Application Research of Computers, Vol. 3, pp. 887-889, 2015
                  3. J. Zhang and H. W. Zhang, “A Method of Defense Strategy Selection based on Non-Cooperative Game Theory,” Computer Science, Vol. 1, pp. 195-201, 2016
                  4. J. Zhang and Y. Li, “Rough Network Security Analysis Model based on Dynamic Game,” Computer Engineering, Vol. 4, pp. 129-134, 2015
                  5. J. Q. Cai, “Research on Network Vulnerability Assessment based on Game Model,” North China Electric Power University, 2011
                  6. J. D. Wang and D. K. Yu, “The Selection Method of Active Defense Strategy of Static Bias Games,” Journal of Xian Electronic and Science University, Vol. 1, pp. 144-150, 2016
                  7. W. Q. Lin and H. Wang, “Research on Active Defense Technology of Network Security based on Non Cooperative Dynamic Game,” Computer Research and Development, Vol. 2, pp. 306-316, 2011
                  8. T. Q. Yuan, “The Research and Experiment of Network Attack and Defense Strategy and Active Defense based on Game Theory,” Computer Application and Software, Vol. 9, pp. 312-315, 2013
                  9. Z. H. Li and C. L. Ma, “Research on the Selection of Active Defense Strategy based on Attack and Defense in the Network,” The Application of Computer, Vol. 12, pp. 3729-3734, 2015
                  10. Y. H. Wen and X. L. Wang, “Based on the Game Theory of Enterprise Information Security Defense Strategy Research,” Computer Engineering, Vol. 9, pp. 162-166, 2013
                  11. X. Liang and W. Wu, “Based on Stochastic Game of Network Survivability Strategy Choice Model,” Computer Applications, Vol. 9, pp. 2609-2612, 2012
                  12. R. A. Howard, “Dynamic Programming and Markov Processes. Cambridge,” Massachusetts: The M.I.T. Press, 1960


                                  Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                  This site uses encryption for transmitting your passwords.