Experimentation and analysis of network anti-mapping security access techniques for illegal scanning
Author:
Li Rui1, Liu Zehui1, Guo Min1, Gao Wei1, Liu Hengwang2
Affiliation:
1. 1 State Grid Shanxi Electric Power Research Institute , Taiyuan , Shanxi , , China . 2. 2 Anhui Jiyuan Inspection And Testing Technology Co., Ltd , Hefei , Anhui , , China .
Abstract
Abstract
With the rapid development of network technology, the increasing scale of the network, and the more complex network structure, network anti-mapping puts forward higher requirements. In this paper, based on the game theory of the network anti-mapping strategy selection method, the network mapping attack is divided into the reconnaissance stage and the mapping stage. According to the opacity of the information of both attackers and defenders, the attacker collects the defender’s information in the reconnaissance stage and introduces the signal game to construct the reconnaissance game model. The attacker and defender in the two-stage game utilize Bayesian equilibrium to solve the problem and select the strategy that maximizes their utility based on the assumed conditions. The results show that for the attack of illegal scanning, the CFE statistics of the attack data increase from 1.5~1.9. The game theory-based network anti-surveillance security access technology can effectively identify subnet and multi-IP devices and, at the same time, reduce the network load, and the network topology nodes can be up to 2134 degrees of freedom, which effectively improves the efficiency of network anti-surveillance.
Publisher
Walter de Gruyter GmbH
Reference24 articles.
1. Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., & Tripathi, V., et al. (2022). Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern recognition letters (May), 157. 2. He, J., Yang, J., Ren, K., Zhang, W., & Li, G. (2019). Network security threat detection under big data by using machine learning. International Journal of Network Security, 21(5), 768–773. 3. ZHOU, Aiping, LIU, Lijun, ZHU, & Huisheng, et al. (2018). Parallel sketch based super node detection with traceability. Chinese Journal of Electronics. 4. Jiang, W., Pan, S., Lu, C., Zhao, Z., Lin, S., & Xiong, M., et al. (2021). Label entropy-based cooperative particle swarm optimization algorithm for dynamic overlapping community detection in complex networks. International Journal of Intelligent Systems. 5. Hadid, R., Karaata, M. H., & Villain, V. (2017). A stabilizing algorithm for finding two node-disjoint paths in arbitrary networks. International Journal of Foundations of Computer Science, 28(04), 411–435.
|
|