期刊文献+

基于动态贝叶斯博弈的攻击预测模型 被引量:13

Attack prediction model based on dynamic bayesian games
在线阅读 下载PDF
导出
摘要 提出了基于动态贝叶斯博弈的攻击预测模型。该模型能根据攻击者的历史行为,使用贝叶斯法则对网络中存在恶意主机节点的概率进行合理的修正,并以此为基础,通过分析攻击者和防御者双方的收益,预测出理性的攻击者和防御者在下一个博弈阶段会选择攻击和防御的概率。预测结果为网络安全管理员进行安全配置提供了有价值的参考依据,从而使被动的检测变为主动的有针对性的防御成为可能。最后介绍了相应的实验过程和结果分析,验证了模型的有效性。 This paper described an attack prediction model based on dynamic bayesian games. According to the historical behaviors of the attacker, this medel reasonably updates the probability of malicious nodes existing in the network by using bayesian law, with which it can predict the probability of attacks or defenses that rationale attacker or defender will take in the next stage of the game, in order to maximize their payoff. Thus the result can be used to assist security administrators to configure the network system. It may change the passive detection to the active protection for the defender. This paper also presented the process of experiment and analysis result for validity of the model.
出处 《计算机应用》 CSCD 北大核心 2007年第6期1545-1547,1550,共4页 journal of Computer Applications
基金 国家973规划项目(2003CB314805)
关键词 动态贝叶斯博弈 攻击预测 入侵检测 dynamic bayesian game attack prediction intrusion detection
  • 相关文献

参考文献9

  • 1HEBERLEIN L.A network security monitor[EB/OL].http://seclab.cs.uodavis.edu/papers/pdfs/th -gd -90.pdf,1990.
  • 2SYVERSON PF.A different look at secure distributed Computation[A].In Proceedings of the 1997 IEEE Computer Security Foundations Workshop[C].CSFW,1997,10:109 -115.
  • 3LYE K,WING JM.Game strategies in network security[A].In Proceedings of the IEEE Computer Security FoundationWorkshop[C].July 2002.
  • 4XU J,LEE W.Sustaining availability of web services under distributed denial of service attacks[J].IEEE Trans.Comput.2003,52,4(2):195 -208.
  • 5LIU P,ZANG W.Incentive-based modeling and inference of attacker intent,objectives,and strategies[A].in Proc.of the 10th ACM Computer and Communications Security Conference (CCS'03)[C].Washington,DC,October2003.179-189.
  • 6LIU P,ZANG W.Incentive-Based Modeling and Inference of Attacker Intent,Objectives and Strategies.[J].ACM Transactions on Information and Systems Security.2005,56(3):283 -298.
  • 7FUDENBERG D,TIROLE J.Game Theory[M].Cambridge,Massachusetts:The MIT Press,1991.320 -340.
  • 8GAMIT.Gambit:Software Tools for Game Theory[EB/OL].http://econweb.tamu.edu/gambit/,2006.
  • 9张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2002..

共引文献196

同被引文献87

引证文献13

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部