...
首页> 外文期刊>Security and communication networks >A game theoretic investigation of deception in network security
【24h】

A game theoretic investigation of deception in network security

机译:网络安全欺骗的博弈论研究

获取原文
获取原文并翻译 | 示例
           

摘要

We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. We discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network. Copyright © 2010 John Wiley & Sons, Ltd.
机译:我们对欺骗对计算机网络的攻击者和防御者之间的交互作用的影响进行了博弈论研究。防御者可以通过将正常系统伪装成蜜罐或通过将蜜罐伪装成正常系统来使用伪装。我们使用信号博弈(不完整信息的非合作两人动态博弈)对防御者与攻击者之间的交互进行建模。对于此模型,我们确定哪些策略可以接受完美的贝叶斯均衡。这些均衡是完善的纳什均衡,在这种均衡中,防御者和攻击者都不会单方面选择偏离其策略。我们讨论了在计算机网络的防御中采用欺骗性均衡策略的好处。版权所有©2010 John Wiley&Sons,Ltd.

著录项

  • 来源
    《Security and communication networks》 |2011年第10期|p.1162-1172|共11页
  • 作者单位

    Secure Cyber Systems, Pacific Northwest National Laboratory, 902 Battelle Boulevard, RO. Box 999, MSIN J4-45, Richland, WA 99352, U.S.A;

    Department of Computer Science, Wayne State University, 5143 Cass Avenue, Detroit, Ml 48202, U.S.A;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    deception; game theory; honeypots;

    机译:欺骗博弈论蜜罐;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号