test
server time: root: http://www.itiis.org
current_path: /journals/tiis/digital-library/manuscript/2527
current_url: http://www.itiis.org/journals/tiis/digital-library/manuscript/2527
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium
  • KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

Vol. 13, No. 10, October 30, 2019
10.3837/tiis.2019.10.024, Download Paper (Free):

Abstract

In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
L. Liu, C. Huang, Y. Fang, and Z. Wang, "Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium," KSII Transactions on Internet and Information Systems, vol. 13, no. 10, pp. 5260-5275, 2019. DOI: 10.3837/tiis.2019.10.024.

[ACM Style]
Liang Liu, Cheng Huang, Yong Fang, , and Zhenxue Wang. 2019. Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. KSII Transactions on Internet and Information Systems, 13, 10, (2019), 5260-5275. DOI: 10.3837/tiis.2019.10.024.