Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust

Author(s):  
Xiao Liang ◽  
Yunpeng Li ◽  
Baohua Zhao ◽  
Zhihao Wang ◽  
Ningyu An
2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.


2020 ◽  
Vol 1550 ◽  
pp. 032024
Author(s):  
Zhenwu Liu ◽  
Zheng Zhang ◽  
Hao Liu ◽  
Gaofei Zhang ◽  
Yuan Chen

2014 ◽  
Vol 543-547 ◽  
pp. 3023-3028
Author(s):  
Shao Jing Zhou

Active defense technology may predict future attack situation and detect unknown attacks, but it has many questions to will be researched: vulnerability, lower mal-ware detection rate, security situation awareness technology has faced problem of inter-organization cooperation, real-time response, correlation analysis, high-load low fault tolerance. Artificial immune technology combines with active defense technology to solve integrated artificial immune security situation awareness system with artificial immune technology and active defense technology by Black Hole theory and for diversification ad development characteristics of the artificial immune and active defense, gives a method about simulating Black Hole accretion theory to achieve absorption and utilization a variety of security and virus technology; a no escaped mechanism simulate the Black Hole; a method about access control method based on Hawking radiation theory. Based on the above work, applies virtual and sandbox technology to achieve network system itself virus immunity, and then that we implement re-engineering and reverse engineering for virus technology in order to study virus and dig more holes, create unified integrated defense tactics, so this defense system will improve ability of situation comprehension, situation prediction and intelligence decision.


Author(s):  
Xiaoping Wang ◽  
Lutong Wang ◽  
Qinying Lin ◽  
Minghui Xia ◽  
Liangliang Chen

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 57778-57786
Author(s):  
Wei Liu ◽  
Yiyang Yao ◽  
Baohua Zhao ◽  
Weiyong Yang ◽  
Longyun Qi ◽  
...  

Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 805
Author(s):  
Leyi Shi ◽  
Xiran Wang ◽  
Huiwen Hou

Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a “passive” active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.


Sign in / Sign up

Export Citation Format

Share Document