网络空间实体信度演化模型及其仿真
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Modeling and Simulation on Entities' Belief in Cyberspace
  • 作者:陶九阳 ; 吴琳 ; 贺筱媛 ; 荣明
  • 英文作者:Tao Jiuyang;Wu Lin;He Xiaoyuan;Rong Ming;Department of Information Operation & Command Training, National Defense University;College of Command Information Systems, PLA University of Sci.& Tech.;
  • 关键词:网络空间 ; D-S证据理论 ; 复杂网络 ; 态势感知
  • 英文关键词:cyberspace;;Dempster-Shafer evidence theory;;complex networks;;situation awareness
  • 中文刊名:XTFZ
  • 英文刊名:Journal of System Simulation
  • 机构:国防大学信息作战与指挥训练教研部;解放军理工大学指挥信息系统学院;
  • 出版日期:2018-09-08
  • 出版单位:系统仿真学报
  • 年:2018
  • 期:v.30
  • 基金:军民共用重大研究计划联合基金(U1435218);; 国家自然科学基金(61174156,61273189,61174035,61374179,61403400,61403401)
  • 语种:中文;
  • 页:XTFZ201809005
  • 页数:9
  • CN:09
  • ISSN:11-3092/V
  • 分类号:30-38
摘要
"伪造"已经成为一种常见的网络攻击方式。研究针对"伪造"攻击的防御措施具有重要意义。"伪造"攻击依赖网络对伪造信息的信(任)度。提出了两种"伪造"攻击方式,并分析了"伪造"攻击的三个必要条件;根据D-S证据理论,建立了网络空间实体对事件的信度模型,设计了面向态势感知共享的网络空间信度合成算法,研究了"伪造"导致的网络实体信度的演化;仿真分析了"伪造"在无尺度网络和小世界网络上的信度合成和演化,得到了网络空间中信度演化的三个结论。
        Of all cyber-attacks, 'fabrication' which is aimed at impacting one's awareness is becoming the common means, so it is of great importance to explore ways so as to defend such attacks. An attack can success or not always rely on the entities' belief of certain events. In this paper, two different ways of 'fabrication' attack are put forward, and three essential conditions for 'fabrication' attack are analyzed. Second, a cyberspace belief model in terms of the Dempster-Shafer framework based on situation awareness theory is built to study the evolution of the cyber entities' belief under the 'fabrication' attack. In addition, an algorithm used to compound D-S belief values among entities in cyberspace is designed. At last, the combination and evolution of D-S belief are studied on the scale-free network and the small world network, three conclusions are proposed at last.
引文
[1]Scott Musman,Aaron Temin.Evaluating the Impact of Cyber Attacks on Missions[J].The Journal of Defense Modeling and Simulation(S1548-5129),2013:25-36.
    [2]刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36.LIU Xin-ran.Survey of network attack classification[J].Journal on Communications|J Communs,2004,25(7):30-36.
    [3]David Silver,Aja Huang.Mastering The Game of Go with Deep Neural Networks and Tree Search[J].NATURE(S0028-0836),2016,529(1):484-489.
    [4]G Shafer.Comparing approximate reasoning and probabilistic reasoning using the Dempster-Shafer framework[J].International Journal of Approximate Reasoning(S0888-613X),2009,50(5):812-821.
    [5]S Mckeever,J Ye,L Coyle,et al.Using Dempster-Shafer Theory of Evidence for Situation Inference[J].Lecture Notes in Computer Science(S0302-9743),2009,5741(1):149-161.
    [6]Endsley M.Toward a Theory of Situation Awareness in Dynamic Systems[J].Human Factors(S0018-7208),1995,37(1):35-64.
    [7]Endsley M R.Measurement of Situation Awareness in Dynamic Systems[J].Human Factors(S0018-7208),1995,37(1):65-84.
    [8]Kevin Mepham,Panos Louvieris,Gheorghita Ghinea.Impact-Focused Cyber Incident Response[C].20th ICCRTS,2015:57.
    [9]史忠植.人工智能[M].北京:机械工业出版社,2016:123-131.SHI Zhong-zhi.Artificial Intelligence[M].Beijing:China Machine Press,2016:123-131.
    [10]Yang J B,Xu D L.Evidential Reasoning Rule for Evidence Combination[J].Artificial Intelligence(S0004-3702),2013,205(1):1-29.
    [11]Yong Deng.Generalized evidence theory[J].Applied Intelligence,2015,43(3):530-543.
    [12]Barabási A-L.Scale-free networks:a decade and beyond[J].Science(S0036-8075),2009,325(5939):412-413.
    [13]M E J Newman.Models of the Small World[J].Journal of Statistical Physics(S0022-4715),2000,101(3):819-841.
    [14]Réka Albert,Hawoong Jeong,Albert-LászlóBarabási.Error and attack tolerance of complex networks[J].Nature,2000,406(1):378-381.
    [15]Jianxi Gao,Yang-Yu Liu,Raissa M D’Souza,et al.Target control of complex networks[J].Nature Communications(S2041-1723),2014,5415(5):1-8.