Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack-Defense Game

被引:0
|
作者
Wang, Wenhao [1 ,2 ]
Chen, Xingguo [3 ]
Li, Yuwei [2 ]
Zhu, Cheng [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230031, Peoples R China
[2] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 20期
基金
中国国家自然科学基金;
关键词
network attack-defense game; partially observable stochastic game; agent-based modeling; reinforcement learning; CHALLENGES;
D O I
10.3390/app14209234
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This paper presents a novel multi-dimensional asymmetric game model for network attack-defense decision-making, called "Catch the Cyber Thief". The model is built upon the concept of partially observable stochastic games (POSG) and is designed to systematically incorporate multi-dimensional asymmetry into network attack-defense problems. The attack agent is called a "thief" who wants to control a key host by exploring the unfamiliar network environment, and the defense agent is called a "police" who needs to catch the opponent before its goal is accomplished. The results indicate that the asymmetry of network attack and defense is not only influenced by attack and defense strategies but also by spatio-temporal factors such as the attacker's initial position, network topology, and defense lag time. In addition, we have found that there may exist the "attack rhythm," which makes "how to maintain a good attack rhythm" and "how to generate a robust defense strategy against different attackers" worth exploring. Compared with existing attack-defense game models, our game model can better generate a direct mapping relationship with real elements, enabling us to understand network attack and defense interactions better, recognize security risks, and design defense strategies that can directly serve real-world decision-making.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model
    Xiao-Peng Ji
    Wen Tian
    Weiwei Liu
    Guangjie Liu
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 8859 - 8866
  • [22] Attack-defense differential game to strength allocation strategies generation
    Li, Lingwei
    Xiao, Bing
    Su, Shihong
    Zhang, Haichao
    Wu, Xiwei
    Guo, Yiming
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (06): : 3219 - 3236
  • [23] Attack-defense game for critical infrastructure considering the cascade effect
    Fu Chaoqi
    Gao Yangjun
    Zhong Jilong
    Sun Yun
    Zhang Pengtao
    Wu Tao
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 216
  • [24] Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model
    Ji, Xiao-Peng
    Tian, Wen
    Liu, Weiwei
    Liu, Guangjie
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8859 - 8866
  • [25] ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
    Simmons, Chris B.
    Shiva, Sajjan G.
    Bedi, Harkeerat Singh
    Shandilya, Vivek
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 344 - 365
  • [26] Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets
    Wang, Yuanzhuo
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 89 - 99
  • [27] An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
    Anand, S.
    Sengupta, S.
    Chandramouli, R.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [28] Research on Network Attack-Defense Simulation Training Platform
    Lin, ZhiWei
    Chen, Gang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [29] Novel Solution Approach for Multi-Objective Attack-Defense Cyber Games With Unknown Utilities of the Opponent
    Eisenstadt, Erella
    Moshaiov, Amiram
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2017, 1 (01): : 16 - 26
  • [30] Analysis Method based on Rough Attack-defense Bayes Game Model
    Zhang, Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 109 - 118