Tripartite Evolutionary Game in the Process of Network Attack and Defense

Author:

Chen Zigang1,Fan Chaochao1,Leng Tao2,Chen Long1,Liu Yuhong3,Li Xiaoyong4,Yuan Dongfeng5

Affiliation:

1. Chongqing University of Posts and Telecommunications

2. Sichuan Police College

3. Santa Clara University

4. Beijing University of Posts and Telecommunications

5. Nanyang Institute of Technology

Abstract

Abstract At present, the confrontation in cyberspace is becoming more and more fierce, and network attacks and defenses have become the main form of confrontation between parties in cyberspace. The maximum benefit can be obtained by using scientific decision-making. Traditional network attack and defense research mainly focuses on the relationship between network attackers and network defenders, but enough to explain the benefits of in the evolution of network attacks and defenses. In view of this, this paper constructs a tripartite evolutionary game model among network attackers, network defenders and government regulators, analyzes the evolutionary stability of each participant's strategy choice, discusses the influence of each element on the tripartite strategic choices, and further analyzes the stability of the equilibrium point of the tripartite evolutionary system. The research results show that (1) the timely supervision of the network by the government supervision department is conducive to enhancing the construction of network security and has strategic significance for the security of cyberspace; (2) the network defense department can obtain more effective defense measures when being attacked by the network; (3) the network defense party can analyze the strategic defense requirements that are more in line with its own benefits. Finally, we use Matlab2021a to conduct simulation analysis, verify the effectiveness of the evolutionary game model under different initial conditions, and put forward reasonable suggestions for network defenders and government regulators according to the analysis conclusions.

Publisher

Research Square Platform LLC

Reference27 articles.

1. Fang, BX (2015) A hierarchy model on the research fields of cyberspace security technology. Chinese Journal of Network and Information Security 1(1): 1--6

2. Zhang, HW and Yu, DK and Hang, JH and others (2016) Defense policies selection method based on attack-defense signaling game model. Journal on Communications 37(5): 51--61

3. Fallah, Mehran (2008) A puzzle-based defense strategy against flooding attacks using game theory. IEEE transactions on dependable and secure computing 7(1): 5--19 IEEE

4. Wang, YZ and Yu, Jianye and Qiu, Wen and Shen, HW and Cheng, XQ and Lin, C (2015) Evolutionary game model and analysis methods for network group behavior. Chinese Journal of Computers 38(2): 282--300

5. Chunlei, Wang and Qing, Miao and Yiqi, Dai (2012) Network survivability analysis based on stochastic game model. IEEE, 99--104, 2012 Fourth International Conference on Multimedia Information Networking and Security

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3