Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [1] An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
    Chen, Zhuoxing
    Lu, Yiqin
    Qin, Jiancheng
    Cheng, Zhe
    IEEE ACCESS, 2021, 9 (09): : 129032 - 129050
  • [2] Markov game modeling of mimic defense and defense strategy determination
    Zhang X.
    Gu Z.
    Wei S.
    Shen J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (10): : 143 - 154
  • [3] A Framework for Mimic Defense System in Cyberspace
    Guangsong Li
    Wei Wang
    Keke Gai
    Yazhe Tang
    Benchao Yang
    Xueming Si
    Journal of Signal Processing Systems, 2021, 93 : 169 - 185
  • [4] A Framework for Mimic Defense System in Cyberspace
    Li, Guangsong
    Wang, Wei
    Gai, Keke
    Tang, Yazhe
    Yang, Benchao
    Si, Xueming
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (2-3): : 169 - 185
  • [5] Evaluation of mimic defense strategy based on M-FlipIt game model
    Ding S.
    Qi N.
    Guo Y.
    1600, Editorial Board of Journal on Communications (41): : 186 - 194
  • [6] Optimal network defense strategy selection based on Bayesian game
    Wang Z.-G.
    Lu Y.
    Li X.
    International Journal of Security and Networks, 2020, 15 (02) : 67 - 77
  • [7] An Optimal Decision-Making Method for Cyberspace Countermeasure Based on Game Theory
    Chen, Tian
    Xian, Ming
    Gu, Jun
    Wang, Huimei
    Du, Ruixiang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 878 - 883
  • [8] Optimal Strategy in Covert Communication based on Game Theory
    Wang, Jianquan
    Tang, WanBin
    Li, Xiaoping
    Li, Shaoqian
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [9] An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense
    Zhu, Zhengbin
    Yu, Hong
    Liu, Qinrang
    Liu, Dongpei
    Yu, Huapeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] Optimal Network Defense Strategy Selection Based on Markov Bayesian Game
    Wang, Zengguang
    Lu, Yu
    Li, Xi
    Nie, Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5631 - 5652