Attack and defense evolutionary game analysis based network defense action decision method

An evolutionary game and decision-making method technology, applied in the field of network security, can solve problems such as ignoring dependencies, failing to consider attack-defense dependencies, reducing the effectiveness and accuracy of models and methods, etc.

Active Publication Date: 2018-01-09
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional evolutionary game fails to consider the dependence relationship between the strategies of the same game group between the offensive and defensive parties.
Strategy dependence is one of the characteristics of the attack and defense process. In the actual network att

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack and defense evolutionary game analysis based network defense action decision method
  • Attack and defense evolutionary game analysis based network defense action decision method
  • Attack and defense evolutionary game analysis based network defense action decision method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the objectives, technical solutions and advantages of the present invention clearer and more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0032] The technical terms involved in the examples are explained as follows: Evolutionary Game Theory: Evolutionary GameTheory originated from Darwin's theory of biological evolution, inheriting the biological theory of species evolution, starting from the condition of individual bounded rationality, and taking group behavior as the research object In explaining the development process and evolutionary selection of biological species, it explains the evolutionary game process of biological behavior. Through long-term trial and error, imitation, and improvement, all game players will tend to a stable strategy, which may be stable for a long time in the group organization. This stable strategy equilibrium is very sim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network safety, and particularly to an attack and defense evolutionary game analysis based network defense action decision method. The attack and defense evolutionary game analysis based network defense action decision method comprises the steps of introducing an excitation factor of a same game group strategy dependence relationship to build a network attack and defense evolutionary game model; performing balanced solution on the network attack and defense evolutionary game model to obtain different balance points in an attack and defense evolution process; and determining an optimal defense strategy based on the balance points; and performing stability analysis on the balance points to obtain a correspond game evolutionary trend. Accordingto the method, the excitation factor is introduced, the dynamic evolution process is copied to describe the network attack and defense process, and the network attack and defense evolutionary game model based on an improved evolutionary game theory is built; evolutionary balanced solution is carried out for the circumstances that the attacker and the defender have multiple selectable strategies, the obtained balance points are subjected to the stability analysis, the network attack and defense game model and the application scope are extended, the practicability and accuracy of the model are improved, and important guiding significance is provided for the network safety technology.

Description

Technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network defense action decision-making method based on attack and defense evolution game analysis. Background technique [0002] With the development of information technology, various network infrastructures have spread across all fields of human society, greatly improving the efficiency of people's lives and work, and correspondingly, people are more dependent on cyberspace. People’s actual demand for the intelligent degree of continuous benefit in social development has led to the development of cyberspace in the direction of large scale and complex environment, which directly leads to the increase of unstable factors in the network environment, from hackers, Trojan horses, virus programs, Malicious code, physical failures, man-made sabotage, and other threats emerge in endlessly, making cyberspace security face severe threats and challenges. How to ensure n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 张恒巍王衡军黄健明王晋东寇广王娜
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products