Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [21] Cyberspace attack and defense game based on reward randomization reinforcement learning
    Zhang, Lei
    Li, Hongmei
    Pan, Yu
    Zheng, Qibin
    Li, Wei
    Liu, Yi
    ARRAY, 2022, 16
  • [22] Optimal Strategy Selection of Dynamic Protocol Stack Based on Game Theory
    He, Zhengke
    Lu, Bin
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 373 - 381
  • [23] Optimal Defense Strategy in WSNs Based on the Game of Multi-stage Intrusion Detection
    Zhou Weiwei
    Yu Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 63 - 71
  • [24] Optimal strategy selection approach to moving target defense based on Markov robust game
    Tan, Jing-lei
    Lei, Cheng
    Zhang, Hong-qi
    Cheng, Yu-qiao
    COMPUTERS & SECURITY, 2019, 85 : 63 - 76
  • [25] Optimal strategy selection approach of moving target defense based on Markov time game
    Tan J.
    Zhang H.
    Zhang H.
    Jin H.
    Lei C.
    1600, Editorial Board of Journal on Communications (41): : 42 - 52
  • [26] Optimal defense strategy for AC/DC hybrid power grid cascading failures based on game theory and deep reinforcement learning
    Deng, Xiangli
    Wang, Shirui
    Wang, Wei
    Yu, Pengfei
    Xiong, Xiaofu
    FRONTIERS IN ENERGY RESEARCH, 2023, 11
  • [27] Incumbents’ defense strategies: a comparison of deterrence and shakeout strategy based on evolutionary game theory
    Christian Homburg
    Andreas Fürst
    Thomas Ehrmann
    Eugen Scheinker
    Journal of the Academy of Marketing Science, 2013, 41 : 185 - 205
  • [28] A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
    Fallah, Mehran S.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (01) : 5 - 19
  • [29] A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice
    Hu, Yongjin
    Zhang, Han
    Guo, Yuanbo
    Li, Tao
    Ma, Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [30] Incumbents' defense strategies: a comparison of deterrence and shakeout strategy based on evolutionary game theory
    Homburg, Christian
    Fuerst, Andreas
    Ehrmann, Thomas
    Scheinker, Eugen
    JOURNAL OF THE ACADEMY OF MARKETING SCIENCE, 2013, 41 (02) : 185 - 205