基于Cheat-FlipIt博弈的网络安全对抗建模与分析
作者:
作者单位:

1.国防科技大学电子对抗学院,安徽合肥 230037 ;2.网络空间安全态势感知与评估安徽省重点实验室,安徽合肥 230037

作者简介:

熊鑫立,男,1991年生,博士,讲师,研究方向为网络空间建模与仿真、动态防御技术和智能博弈方法E-mail:xiongxinli_@nudt.edu.cn

通讯作者:

熊鑫立,E-mail:xiongxinli_@nudt.edu.cn

中图分类号:

TP309

基金项目:


Modeling and analysis of network security adversarial behavior based on Cheat-FlipIt game
Author:
Affiliation:

1.College of Electronic Engineering, National University of Defense Technology, Hefei 230037 , China ; 2.Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037 , China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    针对网络空间安全中的建模问题,以典型的高级持续威胁(advanced persisted threat, APT)攻击中对目标的隐蔽控制为背景,将FlipIt博弈模型进行扩展,引入攻击者的欺骗能力,提出Cheat-FlipIt博弈模型。并基于该模型,探索深度强化学习防御决策对具有一定欺骗能力攻击者的鲁棒性和适用性。理论分析和实验结果表明,所建立的Cheat-FlipIt博弈模型较好地反映了APT的欺骗过程和特点。

    Abstract:

    Addressing the issue of security adversarial modeling in cyberspace security, this paper expanded upon the FlipIt game model against the backdrop of covert control over targets in typical advanced persistent threat (APT) attacks. It introduced the deceptive capabilities of attackers and proposed the Cheat-FlipIt game model. Based on this model, the study explored the robustness and applicability of deep reinforcement learning (DRL) defense decisions to attackers with certain deceptive capabilities. Theoretical analysis and experimental results indicate that the established Cheat-FlipIt game model aptly reflects the deception process and characteristics of APTs.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-08-30
  • 最后修改日期:2023-12-19
  • 录用日期:
  • 在线发布日期: 2024-07-22
  • 出版日期:
文章二维码