[1]刘建波.一种基于攻防成本博弈的防御策略评价模型[J].计算机技术与发展,2011,(10):229-232.
 LIU Jian-bo.A Evaluation Model of Defensive Strategy Based on Attack-Defense Game Cost[J].,2011,(10):229-232.
点击复制

一种基于攻防成本博弈的防御策略评价模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年10期
页码:
229-232
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
A Evaluation Model of Defensive Strategy Based on Attack-Defense Game Cost
文章编号:
1673-629X(2011)10-0229-04
作者:
刘建波
山东财政学院计算机网络中心
Author(s):
LIU Jian-bo
Network Center, Shandong University of Finance
关键词:
信息安全攻防博弈成本收益诱导迂回防御策略
Keywords:
information security attack-defense game cost profit inducible and circuitous tactics defensive strategy
分类号:
TP309
文献标志码:
A
摘要:
为了探求信息系统的最佳防御等级策略,从经济博弈论的全新角度研究信息安全攻防策略问题,提出一种基于“诱导迂回”的信息安全系统架构,建立基于攻防成本差异博弈的评价体系,以成本差异最大化为基点建立一种边界数学模型,刻画网络安全攻防矛盾,从而解决最佳防御策略的选取。通过仿真实验数据分析上述信息结构与模型。结果证明,提出的模型和系统结构是可行有效的,对于减少信息安全投资的盲目性、指导建设防御体系具有重要的实践意义
Abstract:
In order to explore the optimal strategy of defense level of information system,it researches the problem of information safety from the view of economy game, and proposes an system structure of information security based on "inducible and circuitous tactics", and then establishes a evaluation system based on the game of the difference of attack-defense game, in which proposes a boundary mathematical model based on the difference of cost to depict the contradiction of attacker and defender. At last,it analyzes above structure and model through the typical experimental data. Results indicate that the structure and model is feasible and effective, and also has important practical significance to reduce the blindness of the investment and to direct the building of defense system

相似文献/References:

[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(10):185.
[2]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(10):160.
[3]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(10):151.
[4]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(10):159.
[5]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(10):144.
[6]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(10):173.
[7]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
 LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(10):177.
[8]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(10):165.
[9]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(10):177.
[10]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
 DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(10):144.

备注/Memo

备注/Memo:
山东省社科规划项目(09DJGZ18)刘建波(1978-),男,硕士,工程师,研究方向为计算机网络安全与数据挖掘
更新日期/Last Update: 1900-01-01