scholarly journals Design Method for Virtual Network Attack and Defense Platform

2012 ◽  
Vol 3 ◽  
pp. 335-340
Author(s):  
Wang Fangnian ◽  
Peng Gang ◽  
Che Wanfang ◽  
Niu Cong ◽  
Bai Yun ◽  
...  
2013 ◽  
Vol 816-817 ◽  
pp. 638-643
Author(s):  
Yu Song ◽  
Hai Jun Zhou ◽  
Guo Lei Ren

We propose an integrated design method to Network attack and defense Simulation training system. Firstly, taking the actual network attack and defense subjects as materials, establishes the system-related military scenario and models several use cases from the perspective of system resources and user needs. Then, using these use cases plans every system components (federate members) in terms of the distributed framework of HLA. More importantly, the workflow of a typical use case according to the publish/subscribe relationship among federate members is described. Associated with this use case, the structure (and behavior) model, internal/external class and program points of the system are modeled, defined and designed respectively. Finally, the expansibility of the system is described in detail. This method can accurately grasp the properties, functions, behaviors and other characteristics of system members (objects) and improve the rationality and consistency of the simulation system modeling.


Author(s):  
Wang Yang ◽  
Liu Dong ◽  
Wang Dong ◽  
Xu Chun

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.


Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3014
Author(s):  
Pengxi Yang ◽  
Fei Gao ◽  
Hua Zhang

We formalize the adversarial process between defender and attackers as a game and study the non-cooperative evolutionary game mechanism under bounded rationality. We analyze the long-term dynamic process between the attacking and defending parties using the evolutionary stable strategies derived from the evolutionary game model. First, we construct a multi-player evolutionary game model consisting of a defender and multiple attackers, formally describe the strategies, and construct a three-player game payoff matrix. Then, we propose two punishment schemes, i.e., static and dynamic ones. Moreover, through the combination of mathematical derivation with simulation, we obtain the evolutionary stable strategies of each player. Different from previous work, in this paper, we consider the influence of strategies among different attackers. The simulation shows that (1) in the static punishment scheme, increasing the penalty can quickly control the occurrence of network attacks in the short term; (2) in the dynamic punishment scheme, the game can be stabilized effectively, and the stable state and equilibrium values are not affected by the change of the initial values.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


Sign in / Sign up

Export Citation Format

Share Document