• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
Citation: Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.

Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory

More Information
  • Published Date: February 14, 2011
  • Game theory, an important part of artificial intelligent technique, has been applied on network defense very well. Static model has been used widely in most of the previous studies. However, some work shows such model cannot follow the evolving of the strategies of attackers. In this paper, an active defense model based on dynamic game theory of non-cooperative and complete information has been given, that is, the attack-defense game tree has been generated by adding some virtual nodes on the original attack-defense graph. Based on the attack-defense game tree, the best defense strategies are achieved under current network environment through resolving the Nash equilibrium in different situations. Besides, for the scenarios with complete information and incomplete information, two algorithms have been proposed respectively. The analysis and experimental results show that the complexity of the algorithms can be guaranteed not worse than other similar works. Moreover, not only for scenario with complete information, but also in incomplete cases, the sensible results can be found. With the comparison of mixed strategy Nash equilibrium generated by static game and described in a probabilistic form, results given by the sub-game perfect Nash equilibrium are more easily to be understood and operated. Network research based on game theory should have a good application in the future network security product.
  • Related Articles

    [1]Tian Xiao, Chang Jiyou, Zhang Chi, Rong Jingfeng, Wang Ziyu, Zhang Guanghua, Wang He, Wu Gaofei, Hu Jinglu, Zhang Yuqing. Survey of Open-Source Software Defect Prediction Method[J]. Journal of Computer Research and Development, 2023, 60(7): 1467-1488. DOI: 10.7544/issn1000-1239.202221046
    [2]Wang Yuqing, Yang Qiusong, Li Mingshu. A Cache Replacement Policy Based on Instruction Flow Access Pattern Prediction[J]. Journal of Computer Research and Development, 2022, 59(1): 31-46. DOI: 10.7544/issn1000-1239.20200503
    [3]Li Mengying, Wang Xiaodong, Ruan Shulan, Zhang Kun, Liu Qi. Student Performance Prediction Model Based on Two-Way Attention Mechanism[J]. Journal of Computer Research and Development, 2020, 57(8): 1729-1740. DOI: 10.7544/issn1000-1239.2020.20200181
    [4]Zhang Yixuan, Guo Bin, Liu Jiaqi, Ouyang Yi, Yu Zhiwen. app Popularity Prediction with Multi-Level Attention Networks[J]. Journal of Computer Research and Development, 2020, 57(5): 984-995. DOI: 10.7544/issn1000-1239.2020.20190672
    [5]Miao Xiaoxiao, Xu Ji, Wang Jian. Denoising Autoencoder-Based Language Feature Compensation[J]. Journal of Computer Research and Development, 2019, 56(5): 1082-1091. DOI: 10.7544/issn1000-1239.2019.20180471
    [6]Huang Mingkai, Liu Xianhua, Tan Mingxing, Xie Zichao, Cheng Xu. An Indirect Branch Prediction for Interpreters[J]. Journal of Computer Research and Development, 2015, 52(1): 66-82. DOI: 10.7544/issn1000-1239.2015.20130970
    [7]Wang Wenxiang, Zhang Guangfei, Shen Haihua. A 2D-Cache Based Memory Bandwidth Optimization Method for H.264 Motion Compensation[J]. Journal of Computer Research and Development, 2012, 49(1): 55-63.
    [8]Dong Yongqiang, Yang Lu, and Dai Jiangpeng. Network Pricing Mechanism with Congestion Charge and Compensation[J]. Journal of Computer Research and Development, 2008, 45(8): 1322-1329.
    [9]Wang Shenghui and Qiu Zhengding. Multi-Step Prediction of VBR Video Traffic Based on Mutifractal Analysis[J]. Journal of Computer Research and Development, 2007, 44(1): 92-98.
    [10]Li Jie, Liu Ruixin, Liu Xianxing, Han Zhijie. A Real Time Network Traffic Prediction Algorithm Based on Hybrid Model[J]. Journal of Computer Research and Development, 2006, 43(5): 806-812.

Catalog

    Article views (926) PDF downloads (1236) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return