Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

被引:5
|
作者
Chen, Zequan [1 ]
Cui, Gang [2 ]
Zhang, Lin [2 ]
Yang, Xin [1 ]
Li, Hui [1 ]
Zhao, Yan [3 ]
Ma, Chengtao [4 ]
Sun, Tao [5 ]
机构
[1] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] State Key Lab Nucl Power Safety Monitoring Techno, Shenzhen 518055, Peoples R China
[3] Shenzhen SmartCity Commun Co Ltd, Shenzhen 518055, Peoples R China
[4] Guangdong Yue Gang Water Supply Co Ltd, Shenzhen 518055, Peoples R China
[5] Univ Town Shenzhen, Network Informat Ctr, Shenzhen 518055, Peoples R China
关键词
Markov processes; Security; Stability analysis; Cyberspace; Switches; Games; Licenses; Cyberspace mimic defense; incomplete information; dynamic game; Markov;
D O I
10.1109/ACCESS.2021.3077075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of systems, there are still some critical gaps with respect to design a defensive strategy under costs and security. In this paper, we propose a dual model to dynamically select the number of executors being reconfigured according to the states of the executors. First, we establish a Markov anti-attack model to compare the effects of CMD under different types of attack. Then, we use a dynamic game of incomplete information to determine the optimal strategy, which achieves the balance of the number of reconfiguration and security. Finally, experimental results show that our dual model reduces defensive costs while guarantees security.
引用
收藏
页码:68376 / 68386
页数:11
相关论文
共 50 条
  • [41] Optimal competition strategy analysis of China Railway Express based on evolutionary game theory
    Feng, Fenling
    Li, Xiaojie
    Liang, Junkai
    Liu, Yang
    Liu, Chengguang
    PLOS ONE, 2022, 17 (03):
  • [42] Optimal incentive strategy in blockchain-based mobile crowdsensing using game theory
    Liu, Yujie
    Wang, Shangping
    Zhang, Duo
    Zhang, Qian
    Wang, Jifang
    COMPUTER NETWORKS, 2023, 237
  • [43] Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model
    Mi, Yan
    Zhang, Hengwei
    Hu, Hao
    Tan, Jinglei
    Wang, Jindong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Power source–power grid coordinated typhoon defense strategy based on multiagent dynamic game theory
    Kai Su
    Liping Jiang
    Jizhen Liu
    Global Energy Interconnection, 2021, 4 (03) : 285 - 294
  • [45] Joint Attack-Defense Strategy Based on Game Theory for Cognitive Devices in Covert Communication Networks
    Van-Hiep Vu
    Koo, Insoo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (02) : 544 - 548
  • [46] Power source–power grid coordinated typhoon defense strategy based on multiagent dynamic game theory
    Su, Kai
    Jiang, Liping
    Liu, Jizhen
    Global Energy Interconnection, 2021, 4 (03) : 285 - 294
  • [47] MDFS: A Mimic Defense Theory based Architecture for Distributed File System
    Lin, Zhili
    Li, Kedan
    Hou, Hanxu
    Yang, Xin
    Li, Hui
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2670 - 2675
  • [48] Active defense strategy selection based on the static Bayesian game
    Wang J.
    Yu D.
    Zhang H.
    Wang N.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2016, 43 (01): : 144 - 150
  • [49] Radar Waveform Strategy Based on Game Theory
    Wang, Honglin
    Li, Wei
    Wang, He
    Xu, Jianye
    Zhao, Junlong
    RADIOENGINEERING, 2019, 28 (04) : 757 - 764
  • [50] Optimal dynamic auditing based on game theory
    Nikolaos Anastasopoulos
    Dimitrios Asteriou
    Operational Research, 2021, 21 : 1887 - 1912