Affiliation:
1. Harbin Normal University
2. Northeast Forestry University
Abstract
to strengthen the network security and to enhance the accuracy of the network security risk assessment, the essay conducts game analysis to the security system of protective mechanisms. Using the basic theory of games and the analytical and comparative method, and raising the network security and physical model for the security system, this process will protect and improve the network security. At the aspect of setting the model, we did not rely on the traditional game theory, but creatively set behavior of the game for a large number of players for the limit logos of groups in the model, and paid more attention to the detection system to reach a state of stability. Analysis shows that the proposed models and the method are feasible and effective.
Publisher
Trans Tech Publications, Ltd.
Reference10 articles.
1. Syverson PF. A different look at secure distributed computation/Proceedings of the 1997 IEEE Computer Security Foundations Workshop. MA, USA, 1997: 109-115.
2. Burke D. Towards a game theory model of information fare [M.S. dissertation]. Technical Report: AFIT/GSS/LAL/99D1. AiHoree Institute of Technology, (1999).
3. Lye K; Wing J Game strategies in network security. [J]. International Jour-nal of Information Security, 2005, 4(1-2): 71-86.
4. Xu J, Lee w. Sustaining availability of web services under distributed denial of service attacks [J] IEEE Transactions on Computers, 2003, 52(2): 195-208.
5. Liu P, Zang W. Incentive—based mudeling and inference of attacker intent, objectives, and strategies/Proceedings of the 10th ACM Computer and Communications Security Conference(CCS'03). Washington, IX; 2003:179—189.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献