Unlock instant, AI-driven research and patent intelligence for your innovation.

Network space mimicry defense method and device based on game theory, medium and terminal

A technology of cyberspace and game theory, applied in the field of network security, can solve the problem of waste of defense cost, and achieve the effect of reducing defense cost and improving resource utilization.

Active Publication Date: 2021-07-09
PENG CHENG LAB +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The negative feedback mechanism detects the multi-mode judgment output. If there is an abnormal situation, the execution body will be reconstructed and cleaned online or offline. When rebuilding and cleaning the execution body online or offline, it is easy to cause waste of defense costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network space mimicry defense method and device based on game theory, medium and terminal
  • Network space mimicry defense method and device based on game theory, medium and terminal
  • Network space mimicry defense method and device based on game theory, medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] This application provides a cyberspace mimicry defense method, device, medium, and terminal based on game theory. In order to make the purpose, technical solution, and effect of this application clearer and clearer, the following describes this application in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0047]Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the specification of the present application refers to the presence of the features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network space mimicry defense method and device based on the game theory, a medium and a terminal, and the method comprises the steps: outputting an output type corresponding to an attacker based on a dynamic heterogeneous redundant structure when the attacker attacks an executor; for each attack type of the attacker, based on a Markov chain corresponding to the attack model and the output type, determining an attack income and a defense income corresponding to the attack type; determining a defense strategy of the defender based on the attack income and the defense income corresponding to each attack type, and performing dynamic defense based on the defense strategy. The output type is determined through the dynamic heterogeneous redundant structure, the attack income and the defense income are determined based on the Markov chain and the output type when the game model is quantized, and finally the defense strategy is determined according to the attack income and the defense income, so the resource utilization rate of an executor can be improved, and the defense cost can be reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method, device, medium and terminal for network space mimicry defense based on game theory. Background technique [0002] Cyberspace mimic defense (CMD) is a new type of network security architecture, which increases the unpredictability of the system through multi-mode ruling and negative feedback mechanism, limits the detection and utilization of vulnerabilities by attackers, and automatically changes system resources. vulnerability, to achieve the goal of not reducing the initial information entropy, so as to realize the response to unknown unknown threats. For example, the typical architecture of cyberspace mimicry defense is Dynamic Heterogeneous Redundancy (DHR). Dynamic Heterogeneous Redundancy implements intrusion detection of attack behavior and dynamic execution of defense strategies through multi-mode arbitration and negative feedback mechanisms. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/1441
Inventor 李挥杨昕王菡陈泽权
Owner PENG CHENG LAB