期刊文献+

基于不完全信息动态博弈的入侵容忍技术 被引量:2

Intrusion tolerance based on dynamic game of incomplete information
在线阅读 下载PDF
导出
摘要 为了使入侵容忍系统和可疑者进行最优的策略选择,提出了基于不完全信息动态博弈的入侵容忍技术。根据博弈双方的特点,引入两人随机博弈模型进行分析,并通过精炼贝叶斯纳什均衡来确定双方选择最优的策略。同时为了能够确定可疑者类型,采用熵权和灰色关联分析的方法来进行推理。结合实例使用各种行为特征值来计算灰色关联度,从而在博弈过程中判断可疑者是黑客的概率,验证了该方法的可行性和客观性,从而更好地帮助入侵容忍系统进行策略选择。 In order to help the intrusion tolerance system and suspicious persons to choose the optimal strategies,the intrusion tolerant technology based on incomplete information dynamic game is put forward.According to the characteristics of two sides in the game,the two-player stochastic game models is introduced to analyze the relations,and the perfect Bayesian Nash equilibrium is presented to identify the optimal strategy for them.To estimate the types of suspicious persons,the entropy weight and the gray relational analysis are adopted.With examples,the value of gray correlation degree is calculated by virtue of the behavioral features,and that can help to determine the probability of hackers in the game process,as well to find the optimal strategies for intrusion tolerance system,its feasibility and objectivity are proved.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第11期2430-2431,2486,共3页 Computer Engineering and Design
基金 国家"211工程"重点建设基金项目(181070H901)
关键词 不完全信息动态博弈 入侵容忍 黑客 熵权 灰色关联分析 dynamic game of incomplete information intrusion tolerance hacker entropy weight gray relational analysis
作者简介 作者简介:娄燕强(1984--),男,安徽合肥人,硕士研究生,研究方向为网络安全、博弈论: 宋如顺,教授,研究方向为网络安全; 马永彩,硕士研究生,研究方向为信息安全。E-mail:louyanqiang@sina.com
  • 相关文献

参考文献9

  • 1Zhao Kuo,Nurbol,Ren Fei,et al.Surveys on the Intrusion Tolerance system [M]. Communications and networking in China. Springer Berlin Heidelberg,2009:90-97.
  • 2Li Bingyang, Wang Huiqiang, Feng Guangsheng. Adaptive hierarchical intrusion tolerant model based on autonomic computing[C].International Conference on Security Technology,2008: 137-141.
  • 3Gong Fengmin, Katerina Goseva-Popstojanova, Wang Feiyi. Characterizing intrusion tolerant systems using a state transition model[C]. DARPA Information Survivability Conference & Exposition II,2001:211-221.
  • 4John C Harsanyi.Games with incomplete information played by "Bayesian"players, Ⅰ -Ⅲ[J].Management Science,2004,50(12): 1804-1817.
  • 5MBA智库百科.博弈论[EB/OL].http://wiki.mbalib.com/wiki/%E5%8D%9A%E5%BC%88%E8%AE%BA.
  • 6Kong-wei Lye,Jeannette M Wing.Game strategies in network security[J]. International Journal of Information Security,2005(4): 71-86.
  • 7肖红云,肖兵.综合集成赋权法在数据融合能力评估中的应用[J].湖南工业大学学报,2008,22(5):82-85. 被引量:4
  • 8Le Hegarat-Mascle S,Richard D,OttleC.Multi-scale data fusion using Dempster-Shafer evidence theory[C].Geoscience and Remote Sensing Symposium,2002:911-913.
  • 9李国良,付强,孙勇,冯艳.基于熵权的灰色关联分析模型及其应用[J].水资源与水工程学报,2006,17(6):15-18. 被引量:72

二级参考文献21

共引文献74

同被引文献32

  • 1彭代彦.农业机械化与粮食增产[J].经济学家,2005(3):50-54. 被引量:27
  • 2杨宇.多指标综合评价中赋权方法评析[J].统计与决策,2006,22(13):17-19. 被引量:226
  • 3Bygkues M, Colazzo D, Crafa S, et al. A type system for discretionary access control[J]. Mathematical Struc- tures in Computer Science, 2009,19(4) : 839-875.
  • 4Ray I, Kumar NL Towards a location-based mandatory access control model[J]. Computers &- Security, 2006, 25(1) :36-44.
  • 5Martinez GarciA C, Navarri ARrribas G, Borrell J. Fuzzy Role-based access control[J]. Information Pro- cessing Letters, 2011,111 (10): 483-487.
  • 6OASIS. Profiles for the OASIS security assertion markup language (SAML) version2. 0[EB/OL]. (2005-03-15). ht- tp:///does, oasis- open. org/security/saml/v2. O/saml-2. 0- oa zip.
  • 7OASIS. Extensible access control markup language (XACML) version2. 0. working draft 09 [EB/OL]. (2004-04-16). http.-//www, oasis- open. org/commit- tees/download, php/10577/XACML-2. 0-os-all. zip.
  • 8Calheiros R N, Ranjan R, Beloglazov A, et al. Cloud- Sim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms[J]. Software: Practice and Ex- perience,2011,41(1) :23-50.
  • 9李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 10李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,21(1):163-176. 被引量:50

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部