移动目标防御时间博弈相关研究介绍
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Games of Timing in Moving Target Defense
  • 作者:黄康宇 ; 徐伟光
  • 英文作者:HUANG Kang-yu;XU Wei-guang;College of Command Information Systems,PLAUST;
  • 关键词:移动目标防御 ; 博弈论 ; 时间博弈
  • 英文关键词:moving target defense;;game theory;;games of timing
  • 中文刊名:JSTY
  • 英文刊名:Journal of Military Communications Technology
  • 机构:解放军理工大学指挥信息系统学院;
  • 出版日期:2016-12-25
  • 出版单位:军事通信技术
  • 年:2016
  • 期:v.37;No.142
  • 语种:中文;
  • 页:JSTY201604023
  • 页数:5
  • CN:04
  • ISSN:32-1289/TN
  • 分类号:100-104
摘要
移动目标防御是一种"改变游戏规则"的新型主动防御模式,其中防御者和攻击者之间的交互问题可以使用博弈论进行研究。文章围绕移动目标防御博弈论研究中涉及的时间博弈,对FlipIt博弈模型及其扩展版本的思想和特点进行了介绍和比较,最后总结并指出当前时间博弈模型在移动目标防御研究上的局限性。
        Moving Target Defense(MTD) has been proposed as a "game-changing" active defense to cyber security.Game theories can be used to study the interaction between the defenders and the attackers in MTD.Around the MTD game theory researches of the time involved in game,this article simply introduced and compared the Fliplt game model and its extended versions,summarized and pointed out the limitations of the current games of timing model in the study of MTD.
引文
[1]FUDENBERG D,TIROLE J.Game theory[M].LondontThe MIT Press,1991:1-2.
    [2]HAMILTON S N,MILLER W L,OTT A,et al.Challenges in applying game theory to the domain of information warfare[EB/OL].(2001-09-04)[2016-08-17].http://www.cyberdefenseagency.com/publications/Challenges_in_Applying_Game_Theory_to_the_Domain_of_Information_Warfare.pdf.
    [3]HAMILTON S N,MILLER W L.OTT A,et al.The role of game theory in information warfare[EB/OL].(2002-02-19)[2016-08-17].http://www.cyberdefenseagency.com/publications/The_Role_of_Game_Theory_in_Information_Warfare.pdf.
    [4]ROY S,ELLIS C,SHIVA S,et al.A survey of game theory as applied to network security[C]//47th Hawaii International Conference on System Sciences.Hawaii:IEEE Computer Society,2010:1-10.
    [5]BLACKWELL D.The noisy duel one bullet each arbitrary accuracy[EB/OL].(2016-08-ll)[2016-08-18].https://www.researchgate.net/publication/263606039_The_noisy_duel_one_bullet_each_arbitrary_accuracy.
    [6]BOWERS K D,DIJK M V,GRIFFIN R,et al.Defending against the unknown enemy:applying FLIPIT to system security[C]//The 3rd Conference on Decision and Game Theory for Security.Budapest,Hungary:Springer-Verlag,2012:400-403.
    [7]DIJK M VJUELS A.OPREA A,et al.FlipIt:the game of"stealthy takeover"[J].Journal of Cryptology,2013,26(4):655-713.
    [8]NOCHENSON A,GROSSKLAGS J.A behavioral investigation of the Fliplt game[C]//The Workshop on the Economics of Information Security.Washington,DC:Georgetown University,2013:1-18.
    [9]LASZKA A,JOHNSON B,GROSSKLAGS J.Mitigating covert compromises:game-theoretic model of targeted and nontargeted covert attacks[C]//The 9th Conference on Web and Internet Economics.Cambridge:Springer-Verlag,2013:319-332.
    [10]PRAKASH A.WELLMAN M P.Empirical game-theoretic analysis for moving target defense[C]//2nd ACM Workshop on Moving Target Defense.Denver,USA:ACM Press,2015:57-65.
    [11]WELLMAN M P,PRAKASH A.Empirical game-theoretic analysis of an adaptive cyber-defense scenario[C]//The 5th Conference on Decision and Game Theory for Security.Los Angeles,USA:Springer-Verlag,2014:43-58.
    [12]LASZKA A.HORVATH G.FELEGYHAZI M,et al.FlipThem:modeling targeted attacks with Fliplt for multiple resources[C]//The 5th Conference on Decision and Game Theory for Security.Los Angeles,USA:Springer-Verlag,2014:175-194.
    [13]PAWLICK J.FARHANG S,ZHU Q.Flip the cloud:cyber-physical signaling games in the presence of advanced persistent threats[C]//Conference on Decision and Game Theory for Security.London,UK:Springer-Verlag,2015:289-308.
    [14]ROSSIDES M.Extending the analysis of the Fliplt game[D].Massachusetts,US Massachusetts Institute of Technology,2013.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700