Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense strategy generation method based on three-party dynamic game

A generation method and dynamic game technology, applied in the field of network security, can solve problems such as inaccurate results and ignoring the influence of users

Pending Publication Date: 2020-06-05
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a common problem in all of them, that is, the influence of users in the offensive and defensive game is ignored.
Some scholars use a variable with uncertainty to represent the influence caused by the third party's participation in the two-party game, and the results obtained in this way are not accurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense strategy generation method based on three-party dynamic game
  • Defense strategy generation method based on three-party dynamic game
  • Defense strategy generation method based on three-party dynamic game

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] as attached figure 1 As shown, the present invention is a method for generating a defense strategy based on a three-party dynamic game, which is divided into three stages: a preprocessing stage, a dynamic game stage, and a strategy generation stage.

[0055] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, a detailed description will be given below in conjunction with the accompanying drawings and an actual topology example.

[0056] The steps of the defense strategy generation method based on the tripartite dynamic game are as follows:

[0057] S1. Build the attack graph. Construct the vulnerability relationship in the entire topology structure as an attack graph through the real network topology structure;

[0058] S2. Construct the state space and behavior constraint space of the dynamic tripartite game;

[0059] S3. Use the balanced value propagation algorithm to quantify the attack graph n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense strategy generation method based on a three-party dynamic game, and belongs to the field of network security. According to the method, internal and external threats are comprehensively considered, and the internal threats are instantiated in the strategy generation process. In the node value measurement process of the initialization stage, the influence of multiple targets on the node is balanced so as to reduce the bias problem in node value calculation. In the sequential game process, the defense party uses a heuristic method to obtain the path with the maximum threat in the plurality of attack paths for blocking; a user side models a strategy of a user by using a mixed strategy game model, so the coupling of a stealth attack and an internal threat is improved; for attackers, uncertainty of behavior modes of the attackers is increased, three attack strategies are used for simulating attack behaviors of different attackers respectively, and finally, defense strategies in each time period are combined to generate a final protection strategy set. According to the invention, through dynamic analysis of three-party behaviors, decision suggestions withhigher risk prevention capability are provided for an administrator.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method for generating a defense strategy based on a three-party dynamic game. Background technique [0002] At present, the difficulty in generating security policies lies in the multi-step nature of malicious attacks. At the same time, users inside the system may expose specific information about vulnerabilities inside the system because they have permissions that the attacker does not have. In order to cope with the dynamics of information systems, combining dynamic target defense technology with attack graph technology is a very effective means. Existing research can be divided into two categories: combining game models and combining advanced models. However, there is a common problem in all of them, that is, the influence of users in the offensive and defensive game is ignored. Some scholars use an uncertain variable to represent the influence caused by the third party's p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06F17/10
CPCG06F17/10H04L41/12H04L63/1433H04L63/1441H04L63/205
Inventor 胡晨傲燕雪峰
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products