2021
DOI: 10.1109/access.2021.3077075
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

Abstract: Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD constructs multiple executors which are diverse functional equivalent variants for the protected target and arbitral mechanism. In this way, CMD senses the results of current running executors and changes the attack surface. Although CMD enhances the security of s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 30 publications
0
1
0
Order By: Relevance
“…They evaluated the historical confidence of the executors by setting a sliding window, which can effectively improve the operating efficiency of the algorithm and the security of the system under non-uniform distributed cyber attacks. Moreover, by introducing dynamic game theory into the scheduling strategy, Zequan Chen et al [43] proposed a strategy that can balance the defense costs and system security. In this strategy, the number of executors will be dynamically adjusted according to the historical strategies of the attackers, which can reduce the defense cost of the system.…”
Section: ) Combining Differences and Historical Confidencementioning
confidence: 99%
“…They evaluated the historical confidence of the executors by setting a sliding window, which can effectively improve the operating efficiency of the algorithm and the security of the system under non-uniform distributed cyber attacks. Moreover, by introducing dynamic game theory into the scheduling strategy, Zequan Chen et al [43] proposed a strategy that can balance the defense costs and system security. In this strategy, the number of executors will be dynamically adjusted according to the historical strategies of the attackers, which can reduce the defense cost of the system.…”
Section: ) Combining Differences and Historical Confidencementioning
confidence: 99%
“…Relying on the ability to make multifaceted decisions on power grid security issues, game theory is widely applied in the field of network security [9][10][11][12][13][14][15][16]. In [9], a security resource allocation game model is established to discuss the load redistribution attacks problem.…”
Section: Introductionmentioning
confidence: 99%
“…However, the model lacks in describing the cumulative profits in a dynamic, changing game process; ref. [13] establishes a Markov anti-attack model, compares the effectiveness of network space simulation defense under different attack types, and uses dynamic games with incomplete information to determine the optimal strategy; ref. [14] formulates a multistage optimization model for the deployment of a mobile target defense mechanism under a Markov decision, maximizing the profits under environmental constraints.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation