2018
DOI: 10.1109/access.2018.2841885
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(41 citation statements)
references
References 17 publications
0
41
0
Order By: Relevance
“…e most important thing is the introduction of WoLF mechanism, which guarantees the convergence of the algorithm [9]. WoLF-PHC algorithm uses average strategy as the criterion of success and failure, as shown in formulae (6) and (7).…”
Section: Phc Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…e most important thing is the introduction of WoLF mechanism, which guarantees the convergence of the algorithm [9]. WoLF-PHC algorithm uses average strategy as the criterion of success and failure, as shown in formulae (6) and (7).…”
Section: Phc Algorithmmentioning
confidence: 99%
“…(1) N � (attacker, defender) are players participating in the game representing cyber attackers and defenders, respectively Web server CVE-2017-7269 root tid 3 Web server CVE-2014-8517 root tid 4 FTP server CVE-2014-3556 root tid 5 E-mail server CVE-2014-4877 root tid 6 Database server CVE-2013-4730 user tid 7 Database server CVE-2016-6662 root S 0 (A, root) [16,26] are S 6 (D, root) Figure 8: Defense graph. (5) In order to detect the learning performance of the Algorithm 2 more fully, the defender's state-action payoff Q d (s i , d) is initialized with a unified 0, without introducing additional prior knowledge (6) Defender's defense strategy adopts average strategy to initialize, that is,…”
Section: Construction Of the Experiments Scenario Ad-sgmmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the attack-defense effect can be measured by the value of network system. Based on the above analysis of the realistic network attack and defense [8] [17] , the establishment of the attack-defense game model needs to satisfy three assumptions as follows: Assumption 1. Rational assumption.…”
Section: Basic Assumptionsmentioning
confidence: 99%
“…Huang [11] built a network attack and defense model by combining evolutionary game theory and the Markov decision process, and proposed a method for selecting the optimal defense strategy. Hu [12] expanded the static analysis of the attack and defense process into dynamic analysis under the condition of incomplete information, using the Bayesian method to obtain the optimal defense strategy. Olsder [13] formulated a Stackelberg game in the case of a nonzero-sum game and concluded that if each player's cost function is either nonquadratic or nonconvex, both pure and mixed Stackelberg strategies can achieve equilibrium.…”
Section: Introductionmentioning
confidence: 99%