Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack-Defense Game

被引:0
|
作者
Wang, Wenhao [1 ,2 ]
Chen, Xingguo [3 ]
Li, Yuwei [2 ]
Zhu, Cheng [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230031, Peoples R China
[2] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 20期
基金
中国国家自然科学基金;
关键词
network attack-defense game; partially observable stochastic game; agent-based modeling; reinforcement learning; CHALLENGES;
D O I
10.3390/app14209234
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This paper presents a novel multi-dimensional asymmetric game model for network attack-defense decision-making, called "Catch the Cyber Thief". The model is built upon the concept of partially observable stochastic games (POSG) and is designed to systematically incorporate multi-dimensional asymmetry into network attack-defense problems. The attack agent is called a "thief" who wants to control a key host by exploring the unfamiliar network environment, and the defense agent is called a "police" who needs to catch the opponent before its goal is accomplished. The results indicate that the asymmetry of network attack and defense is not only influenced by attack and defense strategies but also by spatio-temporal factors such as the attacker's initial position, network topology, and defense lag time. In addition, we have found that there may exist the "attack rhythm," which makes "how to maintain a good attack rhythm" and "how to generate a robust defense strategy against different attackers" worth exploring. Compared with existing attack-defense game models, our game model can better generate a direct mapping relationship with real elements, enabling us to understand network attack and defense interactions better, recognize security risks, and design defense strategies that can directly serve real-world decision-making.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [2] Cooperative attack-defense game of multiple UAVs with asymmetric maneuverability
    Chen C.
    Mo L.
    Zheng D.
    Cheng Z.
    Lin D.
    Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2020, 41 (12):
  • [3] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [4] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [5] An attack-defense game on interdependent networks
    Peng, Rui
    Wu, Di
    Sun, Mengyao
    Wu, Shaomin
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2021, 72 (10) : 2331 - 2341
  • [6] A Novel Dynamic Method in Distributed Network Attack-Defense Game
    Liu Xiaojian
    Yuan Yuyu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [7] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [8] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [9] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    SECURITY AND PRIVACY, 2021, 4 (01):
  • [10] A Simplified Attack-Defense Game Model for NSSA
    Sun, Xueyan
    Liu, Xiaowu
    Zhang, Shuwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 820 - 828