Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game

被引:36
|
作者
Hu, Hao [1 ]
Liu, Yuling [2 ]
Chen, Chen [3 ]
Zhang, Hongqi [4 ]
Liu, Yi [5 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100190, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[4] Zhengzhou Informat Sci & Technol Inst, Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450000, Peoples R China
[5] Zhengzhou Informat Sci & Technol Inst, Dept Comp Sci & Informat Engn, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersecurity; attack-defense; decision making; optimal defense strategy; evolutionary game; LQRD; NETWORK; GENERATION;
D O I
10.1109/TNSM.2020.2995713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, there are many techniques for cyber security defense such as firewall, intrusion detection and cryptography. Despite decades of studies and experiences on this issue, there still exists a problem that we always pay great attention to technology while overlooking strategy. In the traditional warfare, the level of decision-making and the formulation of optimal strategies have a great effect on the warfare result. Similarly, the timeliness and quality of decision-making in cyber attack-defense also make great significance. Since the attackers and defenders are oppositional, the selection of optimal defense strategy with the maximum payoff is difficult. To solve this problem, the stochastic evolutionary game model is utilized to simulate the dynamic adversary of cyber attack-defense. We add the parameter $\lambda $ to the Logit Quantal Response Dynamics (LQRD) equation to quantify the cognitive differences of real-world players. By calculating the evolutionary stable equilibrium, the best decision-making approach is proposed, which makes a balance between defense cost and benefit. Cases studies on ransomware indicate that the proposed approach can help the defender predict possible attack action, select the related optimal defense strategy over time, and gain the maximum defense payoff.
引用
收藏
页码:1683 / 1700
页数:18
相关论文
共 50 条
  • [21] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
  • [22] A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision
    Jiang, Wei
    Tian, Zhi-hong
    Zhang, Hong-li
    Song, Xin-fang
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 648 - +
  • [23] Establishing evolutionary game models for CYBer security information EXchange (CYBEX)
    Tosh, Deepak
    Sengupta, Shamik
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2018, 98 : 27 - 52
  • [24] Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare
    Chen, Haipeng
    Han, Qian
    Jajodia, Sushil
    Lindelauf, Roy
    Subrahmanian, V. S.
    Xiong, Yanhai
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3779 - 3790
  • [25] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Torres, Douglas
    COMPLEX & INTELLIGENT SYSTEMS, 2018, 4 (03) : 213 - 226
  • [26] Cyber security and cyber defense for Venezuela: an approach from the Soft Systems Methodology
    Douglas Torres
    Complex & Intelligent Systems, 2018, 4 : 213 - 226
  • [27] Network Security Defense Decision-Making Method Based on Stochastic Game and Deep Reinforcement Learning
    Wu, Zenan
    Tian, Liqin
    Wang, Yan
    Xie, Jianfei
    Du, Yuquan
    Zhang, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies
    Attiah, Afraa
    Chatterjee, Mainak
    Zou, Cliff C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [29] An evolutionary approach to group decision making
    Rees, J
    Koehler, GJ
    INFORMS JOURNAL ON COMPUTING, 2002, 14 (03) : 278 - 292
  • [30] Modelling cyber-security experts' decision making processes using aggregation operators
    Miller, Simon
    Wagner, Christian
    Aickelin, Uwe
    Garibaldi, Jonathan M.
    COMPUTERS & SECURITY, 2016, 62 : 229 - 245