2011
DOI: 10.3724/sp.j.1001.2011.03751
|View full text |Cite
|
Sign up to set email alerts
|

Network Security Situation Awareness Approach Based on Markov Game Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
17
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…(3) The attempt of the active evaluation model mainly revolves around the attack model, and each article usually contains three components: model definition, model solving algorithm, and solution result. The definition of the model is generally combined with other disciplines, such as Petri network [96,[153][154][155], game theory [108,124,[159][160][161][162], and Bayesian network [114,132], and some articles also focus on the improvement of model description ability [125,126]; the solution algorithm depends on the definition of the model, and it is generally shown together with the solution result. There are lots of literature [109][110][111][112][113][114] trying to improve on this point, such as the reachable path analysis based on attack graph [101,128,129,143,177], defense strategy analysis [111,124,161], and survivability analysis [126].…”
Section: Status Of Domestic Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…(3) The attempt of the active evaluation model mainly revolves around the attack model, and each article usually contains three components: model definition, model solving algorithm, and solution result. The definition of the model is generally combined with other disciplines, such as Petri network [96,[153][154][155], game theory [108,124,[159][160][161][162], and Bayesian network [114,132], and some articles also focus on the improvement of model description ability [125,126]; the solution algorithm depends on the definition of the model, and it is generally shown together with the solution result. There are lots of literature [109][110][111][112][113][114] trying to improve on this point, such as the reachable path analysis based on attack graph [101,128,129,143,177], defense strategy analysis [111,124,161], and survivability analysis [126].…”
Section: Status Of Domestic Researchmentioning
confidence: 99%
“…θ = {θ A , θ D }is the set of action strategies of both offense and defense. P is the transition probability between game states S. R n = S i × θ × S j ∈(−∞,+∞)), which represents the income function of the person n in the state S i transitioning to the state S j ; GM = {N,S,θ,P,R}, according to this basic definition, after a finite-step (kstep) game process, the system transforms between different states to form a tree structure, the goal of the player is to make their function maximized, and the model's Nash equilibrium strategy f * can be obtained by means of Shapley algorithm or problem transformation solution [162]. The combination of game theory makes the focus of cybersecurity situational awareness rise from technology to management strategy and can portray the psychological activities of each participant, which greatly improves the description ability of the model and the scientific nature of the analysis results.…”
Section: Stochastic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…By collecting, analyzing and processing the information from the sensors, we could identify the attack features, such as the source, size, speed, etc [5] . An effective method on NSSA is highly required to help us fuse all available information properly and comprehend the situation value with ease [6] .Bass [7] first put forward the combination of network security and situational awareness. He gave a network security situation awareness framework based on data fusion.…”
mentioning
confidence: 99%
“…By collecting, analyzing and processing the information from the sensors, we could identify the attack features, such as the source, size, speed, etc [5] . An effective method on NSSA is highly required to help us fuse all available information properly and comprehend the situation value with ease [6] .…”
mentioning
confidence: 99%