期刊文献+

基于动态博弈的网络诱骗信息获取策略研究 被引量:2

A STUDY OF ACQUIRING INFORMATION STRATEGIES BASED ON DYNAMIC GAME
在线阅读 下载PDF
导出
摘要 基于网络诱骗系统信息获取特点的分析,视入侵者与诱骗系统构成网络环境中的博弈主体,结合随机博弈和不完全信息动态博弈理论,探讨了网络对抗环境下诱骗系统信息获取各阶段的获取策略特点。 Based on the characteristics of network decoy system, the acquiring Information strategies of dynamic game theory were suggested. Looked upon the attacker and network decoy system as the game players, and in accordance with the dynamic game of incomplete information theory and stochastic games theory, the characteristics of the acquiring information strategies in different phase of acquiring information under network warfare environments were discussed.
出处 《科技导报》 CAS CSCD 2005年第1期32-34,共3页 Science & Technology Review
基金 国防科技基础研究项目
关键词 网络诱骗 系统信息 入侵者 基于网络 获取 随机 不完全信息动态博弈 博弈主体 策略 理论 network decoy, acquiring Information, dynamic game, network warfare
  • 相关文献

参考文献3

  • 1Lye Kong-wei, Wing Jeannette M. Game Strategies In Network Security [J]. http://www-2.cs.cmu.edu/-wing/publications/CMU-CS-02-136. pdf.
  • 2David Burke. Towards a game theory model of information warfare[J]. Master's thesis, Graduate School of Engineering and Management, Airforce Institute of Technology, Air University,1999.
  • 3Jha S, Sheyner O, Wing J. Minimization and reliability analyses of attack graphs [J]. Carnegie Mellon University Technical Repor tCS-02-109, 2002.

同被引文献33

  • 1贾春福,钟安鸣,张炜,马勇.网络安全不完全信息动态博弈模型[J].计算机研究与发展,2006,43(z2):530-533. 被引量:11
  • 2王卫平,朱卫未.基于不完全信息动态博弈的入侵检测模型[J].小型微型计算机系统,2006,27(2):253-256. 被引量:4
  • 3林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 4[4]Tansu Alpcan,Tamer Basar.A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection[A].Proceedings of the 42nd IEEE Conference on Decision and Control[C].December 2003.
  • 5[5]Afrand Agah,Sajal K Das,Kalyan Basu.A game theory based approach for security in wireless sensor networks[J].IEEE.
  • 6Major G, William T. Cyberspace Operations: Air Force Space Command Takes the Lead [J]. High Frontier,2009,5(3): 3-5.
  • 7Jormakka J, Molsa J V E. Modeling Information Warfare as a Game [J]. Journal of Information Warfare,2005,4 (2): 112-25.
  • 8Basar T. The Gaussian Test Channel with an Intelligent Jam- mer [ J ]. IEEE Transactions on Information Theory, 1983,29 ( 1 ): 152-157.
  • 9Kashyap A, Basar T, Srikant R. Correlated Jamming on MI- MO Gaussian Fading Channels [J]. IEEE Transactions on Information Theory, 2004,50 (9): 2119-2123.
  • 10Carin L,Cybenko G,Hughes J. Quantitaitve Evaluation of Risk for Invenstment Efficient Strategies in Cybersecurity: the Queries Methodology [J]. IEEE Computer,2008,41 (8),21-26.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部