Study on Risk Assessment of Network Security Based on Game Theory

Article Preview

Abstract:

to strengthen the network security and to enhance the accuracy of the network security risk assessment, the essay conducts game analysis to the security system of protective mechanisms. Using the basic theory of games and the analytical and comparative method, and raising the network security and physical model for the security system, this process will protect and improve the network security. At the aspect of setting the model, we did not rely on the traditional game theory, but creatively set behavior of the game for a large number of players for the limit logos of groups in the model, and paid more attention to the detection system to reach a state of stability. Analysis shows that the proposed models and the method are feasible and effective.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 181-182)

Pages:

799-803

Citation:

Online since:

January 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Syverson PF. A different look at secure distributed computation/Proceedings of the 1997 IEEE Computer Security Foundations Workshop. MA, USA, 1997: 109-115.

DOI: 10.1109/csfw.1997.596797

Google Scholar

[2] Burke D. Towards a game theory model of information fare [M.S. dissertation]. Technical Report: AFIT/GSS/LAL/99D1. AiHoree Institute of Technology, (1999).

Google Scholar

[3] Lye K; Wing J Game strategies in network security. [J]. International Jour-nal of Information Security, 2005, 4(1-2): 71-86.

Google Scholar

[4] Xu J, Lee w. Sustaining availability of web services under distributed denial of service attacks [J] IEEE Transactions on Computers, 2003, 52(2): 195-208.

DOI: 10.1109/tc.2003.1176986

Google Scholar

[5] Liu P, Zang W. Incentive—based mudeling and inference of attacker intent, objectives, and strategies/Proceedings of the 10th ACM Computer and Communications Security Conference(CCS'03). Washington, IX; 2003:179—189.

DOI: 10.1145/948109.948135

Google Scholar

[6] Kim M S, Kimberley W. Lighter weight leads to fuel savings[J]. Automotive Engineer, 2004, 29(9): 30-31.

Google Scholar

[7] Xia Zhengyou, Zhang Shiyong. A kind of network security behavior model based on game theory[C]∥Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003. Proceedings of the Fourth International Conference, 2003: 950-954.

DOI: 10.1109/iccnmc.2003.1243072

Google Scholar

[8] Jiang Wei et a1. A game theoretic method for decision and analysis of the optimal active defense strate-ge/Proceedings of the International Conference on Computational Intelligence and Security. Harbin, China, 2007: 819-823.

Google Scholar

[9] Feng Ping-Hui, Lian Yi-Feng, Dai Ying-Xia et a1. An evaluation model of vulnerability exploitation cost for network system. Chinese Journal of Computers, 2006,29(8): 1375-1382(in Chinese).

Google Scholar

[10] Jiang Wei, Fang Bin-Xing et a1. Optimal network security strengthening using attack-defense game model/Proceedings of the 6th International Conference on Information Technology: New Generations ITNG 2009. Las Vegas, Nevada, USA, (2009).

DOI: 10.1109/itng.2009.300

Google Scholar