首页> 外文期刊>Control of Network Systems, IEEE Transactions on >Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
【24h】

Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis

机译:对具有有限资源有限的多个节点的隐形攻击:游戏 - 理论分析

获取原文
获取原文并翻译 | 示例
           

摘要

Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee.
机译:隐身的攻击已成为网络安全的主要威胁。以前的工作在此方向未能捕获实用的资源限制,主要关注一个节点设置。在本文中,我们提出了一个双人游戏理论模型,包括多个独立节点,隐身攻击者和可观察后卫的系统。在我们的模型中,攻击者可以完全遵守后卫的行为和系统状态,而防御者具有零反馈信息。此外,引入了严格的资源约束,以限制两个玩家的攻击/防御频率。我们在非接受和适应性战略下表征了对攻击者和后卫的最佳反应。然后,我们研究了后卫首先宣布其策略和攻击者相应地响应的顺序游戏。我们设计了一种算法,为后卫找到了几乎最佳的策略,并完全分析了其复杂性和性能保证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号