[1]李 阳,赵俊楠,石乐义.基于演化博弈的蜜罐有效性机理证明[J].计算机技术与发展,2020,30(04):105-109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 020]
 LI Yang,ZHAO Jun-nan,SHI Le-yi.Proof of Honeypot Effectiveness Mechanism Based on Evolutionary Game Theory[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2020,30(04):105-109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 020]
点击复制

基于演化博弈的蜜罐有效性机理证明()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年04期
页码:
105-109
栏目:
安全与防范
出版日期:
2020-04-10

文章信息/Info

Title:
Proof of Honeypot Effectiveness Mechanism Based on Evolutionary Game Theory
文章编号:
1673-629X(2020)04-0105-05
作者:
李 阳赵俊楠石乐义
中国石油大学(华东) 计算机与通信工程学院,山东 青岛 266580
Author(s):
LI YangZHAO Jun-nanSHI Le-yi
School of Computer & Communication Engineering,China University of Petroleum,Qingdao 266580,China
关键词:
演化博弈蜜罐有效性演化稳定策略复制动态方程
Keywords:
evolutionary gamehoneypoteffectivenessevolutionary stable strategyreplicator dynamics equation
分类号:
TP393. 06
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 04. 020
摘要:
借鉴自然界生物演变进化过程中复制动态的思想,基于演化博弈对蜜罐技术的有效性机理进行研究,分析网络中攻防双方如何根据自身行动策略及支付函数进行演变,从而使博弈收益最大化。演化博弈从一种全新角度诠释了博弈均衡概念,不再是完全理性也非完全信息,为纳什均衡和均衡战略的选择演绎出新方法。 演化博弈过程中,防御方是包括普通服务和蜜罐的混合系统,其对手是访问混合系统的恶意攻击者,双方构成了博弈参与者。混合网络系统可看作一个生态系统,而来访者则只有攻击者一个种群;混合系统持续为来访者提供服务,攻击者可选择访问或不访问。 论文基于复制动态方程推理计算满足演化稳定策略的均衡点,并利用 Matlab 平台仿真验证博弈双方的策略演变趋势,从而在理论上证明了蜜罐技术的有效性机理。
Abstract:
Inspired by the dynamic replication in biological evolution, we study the inherent effectiveness of honeypot based on the evolutionary game theory, and discuss how the attacker and the defender in the network evolve according to their own action strategies and payment functions,so as to maximize the benefits in the game. The game illustrates conception of equilibriums and develops a new method for Nash equilibrium and strategy, with neither completely rationality nor information. The defender can be regarded as a hybrid system,including the general system and honeypot system while the adversary is the attacker with malicious access to the hybrid system.Both of them form out game players. The hybrid network system is considered to be an ecosystem, and the attacker has only one population. The hybrid system has been providing services to visitors who can choose to access or not access the system. In this paper,the equilibrium point of evolution stable strategy based on replicator dynamics equation is satisfied through evolutionary reasoning,and the strategy evolution trend of the partners in the game is verified through Matlab simulation,which proves the effective mechanism of the honeypot technology theoretically.

相似文献/References:

[1]许显月 张凤斌.基于两级重定向机制的密网研究和设计[J].计算机技术与发展,2009,(05):158.
 XU Xian-yue,ZHANG Feng-bin.Research and Design about Honeynet Based on Two- level Redirect Mechanism[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):158.
[2]李菲 乔佩利.网络深层防御体系模型的研究和实现[J].计算机技术与发展,2008,(02):159.
 LI Fei,QIAO Pei-li.Research and Implementation of Network Defense In- Depth System Model[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(04):159.
[3]焦宏宇,何利文,黄俊.基于蜜场的 Openstack 安全系统[J].计算机技术与发展,2018,28(10):92.[doi:10.3969/ j. issn.1673-629X.2018.10.019]
 JIAO Hong-yu,HE Li-wen,HUANG Jun.Openstack Security System Based on Honeyfarm[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2018,28(04):92.[doi:10.3969/ j. issn.1673-629X.2018.10.019]
[4]高雅卓,刘亚群,邢长友,等.面向网络欺骗防御的攻击诱捕技术研究[J].计算机技术与发展,2022,32(03):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 019]
 GAO Ya-zhuo,LIU Ya-qun,XING Chang-you,et al.Research on Network Deception Defense Oriented AttackTrapping Technology[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2022,32(04):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 019]
[5]姚 旭,王 钢,任秀勤,等.基于发电厂控制系统的工控蜜罐设计与实现[J].计算机技术与发展,2022,32(10):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 019]
 YAO Xu,WANG Gang,REN Xiu-qin,et al.Design and Implementation of Industrial Control Honeypot Based on Power Plant Control System[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2022,32(04):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 019]

更新日期/Last Update: 2020-04-10