Affiliation:
1. Chongqing University of Posts and Telecommunications
2. Sichuan Police College
3. Santa Clara University
4. Beijing University of Posts and Telecommunications
5. Nanyang Institute of Technology
Abstract
Abstract
At present, the confrontation in cyberspace is becoming more and more fierce, and network attacks and defenses have become the main form of confrontation between parties in cyberspace. The maximum benefit can be obtained by using scientific decision-making. Traditional network attack and defense research mainly focuses on the relationship between network attackers and network defenders, but enough to explain the benefits of in the evolution of network attacks and defenses. In view of this, this paper constructs a tripartite evolutionary game model among network attackers, network defenders and government regulators, analyzes the evolutionary stability of each participant's strategy choice, discusses the influence of each element on the tripartite strategic choices, and further analyzes the stability of the equilibrium point of the tripartite evolutionary system. The research results show that (1) the timely supervision of the network by the government supervision department is conducive to enhancing the construction of network security and has strategic significance for the security of cyberspace; (2) the network defense department can obtain more effective defense measures when being attacked by the network; (3) the network defense party can analyze the strategic defense requirements that are more in line with its own benefits. Finally, we use Matlab2021a to conduct simulation analysis, verify the effectiveness of the evolutionary game model under different initial conditions, and put forward reasonable suggestions for network defenders and government regulators according to the analysis conclusions.
Publisher
Research Square Platform LLC
Reference27 articles.
1. Fang, BX (2015) A hierarchy model on the research fields of cyberspace security technology. Chinese Journal of Network and Information Security 1(1): 1--6
2. Zhang, HW and Yu, DK and Hang, JH and others (2016) Defense policies selection method based on attack-defense signaling game model. Journal on Communications 37(5): 51--61
3. Fallah, Mehran (2008) A puzzle-based defense strategy against flooding attacks using game theory. IEEE transactions on dependable and secure computing 7(1): 5--19 IEEE
4. Wang, YZ and Yu, Jianye and Qiu, Wen and Shen, HW and Cheng, XQ and Lin, C (2015) Evolutionary game model and analysis methods for network group behavior. Chinese Journal of Computers 38(2): 282--300
5. Chunlei, Wang and Qing, Miao and Yiqi, Dai (2012) Network survivability analysis based on stochastic game model. IEEE, 99--104, 2012 Fourth International Conference on Multimedia Information Networking and Security