Defense strategies selection based on attack-defense evolutionary game model

Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionar...

Full description

Saved in:
Bibliographic Details
Main Authors: Jian-ming HUANG, Heng-wei ZHANG, Jin-dong WANG, Shi-rui HUANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017019/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850096711035256832
author Jian-ming HUANG
Heng-wei ZHANG
Jin-dong WANG
Shi-rui HUANG
author_facet Jian-ming HUANG
Heng-wei ZHANG
Jin-dong WANG
Shi-rui HUANG
author_sort Jian-ming HUANG
collection DOAJ
description Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.
format Article
id doaj-art-20c042bff40740dda2a08219cb18a050
institution DOAJ
issn 1000-436X
language zho
publishDate 2017-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-20c042bff40740dda2a08219cb18a0502025-08-20T02:41:10ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-01-013816817659706903Defense strategies selection based on attack-defense evolutionary game modelJian-ming HUANGHeng-wei ZHANGJin-dong WANGShi-rui HUANGDue to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017019/network attack-defensebounded rationalityevolutionary gameevolutionary stable strategyoptimal de-fense strategy
spellingShingle Jian-ming HUANG
Heng-wei ZHANG
Jin-dong WANG
Shi-rui HUANG
Defense strategies selection based on attack-defense evolutionary game model
Tongxin xuebao
network attack-defense
bounded rationality
evolutionary game
evolutionary stable strategy
optimal de-fense strategy
title Defense strategies selection based on attack-defense evolutionary game model
title_full Defense strategies selection based on attack-defense evolutionary game model
title_fullStr Defense strategies selection based on attack-defense evolutionary game model
title_full_unstemmed Defense strategies selection based on attack-defense evolutionary game model
title_short Defense strategies selection based on attack-defense evolutionary game model
title_sort defense strategies selection based on attack defense evolutionary game model
topic network attack-defense
bounded rationality
evolutionary game
evolutionary stable strategy
optimal de-fense strategy
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017019/
work_keys_str_mv AT jianminghuang defensestrategiesselectionbasedonattackdefenseevolutionarygamemodel
AT hengweizhang defensestrategiesselectionbasedonattackdefenseevolutionarygamemodel
AT jindongwang defensestrategiesselectionbasedonattackdefenseevolutionarygamemodel
AT shiruihuang defensestrategiesselectionbasedonattackdefenseevolutionarygamemodel