TY - JOUR
T1 - Active Defense Strategy Selection Method Based on Two-Way Signaling Game
AU - Liu, Xiaohu
AU - Zhang, Hengwei
AU - Zhang, Yuchen
AU - Shao, Lulu
AU - Han, Jihong
AU - Namin, Akbar S.
N1 - Publisher Copyright:
© 2019 Xiaohu Liu et al.
Copyright:
Copyright 2019 Elsevier B.V., All rights reserved.
PY - 2019
Y1 - 2019
N2 - Most network security research studies based on signaling games assume that either the attacker or the defender is the sender of the signal and the other party is the receiver of the signal. The attack and defense process is commonly modeled and analyzed from the perspective of one-way signal transmission. Aiming at the reality of two-way signal transmission in network attack and defense confrontation, we propose a method of active defense strategy selection based on a two-way signaling game. In this paper, a two-way signaling game model is constructed to analyze the network attack and defense processes. Based on the solution of a perfect Bayesian equilibrium, a defense strategy selection algorithm is presented. The feasibility and effectiveness of the method are verified using examples from real-world applications. In addition, the mechanism of the deception signal is analyzed, and conclusions for guiding the selection of active defense strategies are provided.
AB - Most network security research studies based on signaling games assume that either the attacker or the defender is the sender of the signal and the other party is the receiver of the signal. The attack and defense process is commonly modeled and analyzed from the perspective of one-way signal transmission. Aiming at the reality of two-way signal transmission in network attack and defense confrontation, we propose a method of active defense strategy selection based on a two-way signaling game. In this paper, a two-way signaling game model is constructed to analyze the network attack and defense processes. Based on the solution of a perfect Bayesian equilibrium, a defense strategy selection algorithm is presented. The feasibility and effectiveness of the method are verified using examples from real-world applications. In addition, the mechanism of the deception signal is analyzed, and conclusions for guiding the selection of active defense strategies are provided.
UR - http://www.scopus.com/inward/record.url?scp=85076746602&partnerID=8YFLogxK
U2 - 10.1155/2019/1362964
DO - 10.1155/2019/1362964
M3 - Article
AN - SCOPUS:85076746602
VL - 2019
JO - Security and Communication Networks
JF - Security and Communication Networks
SN - 1939-0114
M1 - 1362964
ER -