Browse > Article
http://dx.doi.org/10.3837/tiis.2019.10.024

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium  

Liu, Liang (College of Cybersecurity, Sichuan University)
Huang, Cheng (College of Cybersecurity, Sichuan University)
Fang, Yong (College of Cybersecurity, Sichuan University)
Wang, Zhenxue (College of Electronics and Information Engineering, Sichuan University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.10, 2019 , pp. 5260-5275 More about this Journal
Abstract
In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.
Keywords
Bayes-Nash; Nash equilibrium; network attack and defense; game theory; Bayes;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Durkota K, Lisy V, Kiekintveld C, et al., "Game-theoretic algorithms for optimal network security hardening using attack graphs," in Proc. of the 2015 International Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Istanbul, ACM, 1773-1774, 2015.
2 Bedi H S, Roy S, Shiva S, "Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows," in Proc. of 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Paris, IEEE, 129-136, 2011.
3 Sandberg H, Amin S, Johansson K H, "Cyber-physical security in networked control systems: An introduction to the issue," IEEE Control Systems, 35(1), 20-23, 2015.   DOI
4 Roy S, Ellis C, Shiva S, et al., "A survey of game theory as applied to network security," in Proc. of 2010 43rd Hawaii International Conference on System Sciences, Honolulu, IEEE, 1-10, 2010.
5 Sedjelmaci H, Senouci S M, Ansari N, "Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology," IEEE Transactions on Intelligent Transportation Systems, 18(5), 1143-1153, 2017.   DOI
6 Nguyen T H, Wright M, Wellman M P, et al., "Multi-stage attack graph security games: heuristic strategies, with empirical game-theoretic analysis," in Proc. of the 2017 Workshop on Moving Target Defense, Dallas, ACM, 87-97, 2017.
7 Wei J, Binxing F, Zhihong T, etc, "Evaluating Network Security and Optimal Active Defense Based on Attack-Denfense Game Model," Chinese Journal of Computers, 32(4), 817-827, 2009.   DOI
8 Rass S, König S, Schauer S, "Defending against advanced persistent threats using game-theory," PloS one, 12(1), e0168675, 2017.   DOI
9 Zhu J, Zhao B, Zhu Z, "Leveraging game theory to achieve efficient attack-aware service provisioning in EONs," Journal of Lightwave Technology, 35(10), 1785-1796, 2017.   DOI
10 Weiheng Zh, TAO L, "Optimal Active Defense Based on Multi-stage Attack-Defense Signaling Game," Chinese Journal of Electronics, 45(2), 431-439, 2017.
11 Wei J, Bingxing F, Zhi-hong T, "Research on defense strategies selection based on attack-defense stochastic game model," Journal of Computer Research and Development, 47(10), 1714-1723, 2010.
12 Lye K, Wing J M, "Game strategies in network security," International Journal of Information Security, 4(1-2), 71-86, 2005.   DOI
13 Wei L, Sarwat A I, Saad W, et al., "Stochastic games for power grid protection against coordinated cyber-physical attacks," IEEE Transactions on Smart Grid, 9(2), 684-694, 2018.   DOI
14 Lei C, Zhang H Q, Wan L M, et al., "Incomplete information Markov game theoretic approach to strategy generation for moving target defense," Computer Communications, 116, 184-199, 2018.   DOI
15 Chaoyuan Y, Decision theory and methods, Science Press, Bejing, 2006.
16 Kenneth Geers, Strategic cyberspace security, CCD COE Publication, Estonia, 2015.1.
17 Hongsheng G, Cyberspace Security Strategy, Aviation Industry Press, Beijing, 2016
18 Zhenxue W, Anming Z, Yong F, Xiaocong O, Information System Security Risk Estimation and Control Theory, Science Press, Beijing, 2011.
19 Dingpi H, Introduction to Game Theory, China University of Science and Technology Press, Hefei, 2004.
20 Weijin Zh, Game Theory and Information Economics, Truth & Wisdom Press, Shanghai Joint Publishing Press, Shanghai People's Publishing House, Shanghai, 2016.
21 Aumann R J, "Game theory," The New Palgrave Dictionary of Economics, 2017.
22 Liang X, Xiao Y., "Game theory for network security," IEEE Communications Surveys & Tutorials, 15(1), 472-486, 2013.   DOI
23 Liu Y, Comaniciu C, Man H, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. of the 2006 workshop on Game theory for communications and networks, Pisa, ACM, 4, 2006.
24 Esmalifalak M, Shi G, Han Z, et al., "Bad data injection attack and defense in electricity market using game theory study," IEEE Transactions on Smart Grid, 4(1), 160-169, 2013.   DOI
25 Do C T, Tran N H, Hong C, et al., "Game theory for cyber security and privacy," ACM Computing Surveys (CSUR), 50(2), 30, 2017.