用户名: 密码: 验证码:
基于超对策理论的信息安全研究——以美国“棱镜门”事件为例
详细信息    查看官网全文
摘要
本文以美国"棱镜门"事件为例,基于超对策理论对信息安全问题进行研究。文章首先分析决策者的偏好信息,基于一阶超对策理论构建信息安全模型;进而在二阶超对策理论下,运用冲突分析决策支持系统作为辅助处理工具,区分了基于局势和基于策略的超对策稳定性分析方法;最后通过对偏好扰动距离的定义,说明偏好认知错误对均衡解的影响,分析和度量超对策理论均衡结局的鲁棒性,为稳定后分析提供决策支持。本文的研究从冲突的角度分析信息安全问题,给出一种合理的、有效的思路,同时为决策者处理可能面临的信息安全问题提供参考。
Research on information security is given in this paper,which is based on the hypergame.The analysis process of the "PRISM" event in the U.S is formed as an example.Firstly,the preference of both sides are provided,and the information security model is built according to the first-level hypergame.Secondly,the method based on strategy is proposed to analyze the stability by the second-level hypergame,differing from the one based on outcome.This process is applying the Decision Support System as an auxiliary tool.Finally,the influence of cognitive errors on equilibrium is explained,and the robustness analysis of equilibrium outcomes is discussed and measured.Furthermore,decision support analysis after stabled is provided by defining the variation of preference.Therefore,this thesis analyzes information security issue from the angle of the conflict,gives reasonable and effective thought,at the same time,provides a reference for decision makers to handle conflict problems may face.
引文
[1]Roy S,Ellis C,Shiva S,et al.A survey of game theory as applied to network security[J].2010:1-10.
    [2]孙薇,孔祥维,何德全,等.基于演化博弈论的信息安全攻防问题研究[J].情报科学,2008,26(9):1408-1412.
    [3]吕俊杰,邱菀华,王元卓.基于相互依赖性的信息安全投资博弈[J].中国管理科学,2006,14(3):7-12.
    [4]韩文英,闫明星,柴艳妹,等.基于博弈论的企业信息安全攻防策略研究[J].计算机工程,2013,39(9):162-166.
    [5]唐清泉.信息不对称性下的利益冲突与激励贷款合同[J].中国管理科学,2002,10(3):73-76.
    [6]Bennett P G.Toward a theory of hypergames[J].Omega,1977,5(6):749-751.
    [7]Bennett P G,Dando M R.Complex strategic analysis:a hypergame study of the fall of france[J].Journal of the Operational Research Society,1979,30(1):23-32.
    [8]Said A K,Hartley D A.A hypergame approach to crisis decision-Making:The 1973 Middle East War[J].Journal of the Operational Research Society,1982,33(10):937-948.
    [9]Fraser N M.Hipel K W.Metagame analysis of the poplar river conflict[J].Journal of the Operational Research Society,1980,31(5):377-385.
    [10]Kopp C.Shannon,Hypergames and information warfare[J].Journal of Information Warfare,2002,2(2):108-118.
    [11]Giesen M O.Bennett P G.Aristotle's fallacy:a hypergame in the oil shipping business[J].Omega,1979,7(4):309-320.
    [12]Sakakibara H.Okada N,Nakase D.The application of robustness analysis to the conflict with incomplete information[J].IEEE Transactions on Systems Man&Cybernetics Part C Applications&Reviews,2002,32(1):14-23.
    [13]宋业新,黄登斌,肖鹏.基于超对策偏好认知信息沟的均衡结局鲁棒性分析[J].系统工程与电子技术,2013,35(2):362-365.
    [14]Cybenko G.Hypergame theory applied to cyber attack and defense[J].Proc Spie,2010,7(6):4-11.
    [15]Xu Hai Yan,Hipel K W,Kilgour D M.Matrix representation of conflicts with two decision-makers[C].Proceedings of the IEEE Interational confevece on systems,2007:1764-1769.
    [16]Xu Hai Yan,Hipel K W,Kilgour D M.Matrix representation of solution concepts in multiple-decision-maker graph models[J].IEEE Transactions on systems Man and Cybernetics Part A-Systems and Humans,2009,39(1):96-108.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700