scholarly journals Multi-layer Network Attack and Defense Model Based on Entropy Method to Measure Network Security

2019 ◽  
Vol 1302 ◽  
pp. 022068
Author(s):  
Xiaolin Zhao ◽  
Jiong Guo ◽  
Xiaoyi Jiang ◽  
Jingjing Zhao ◽  
Hao Xu
Author(s):  
Wang Yang ◽  
Liu Dong ◽  
Wang Dong ◽  
Xu Chun

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.


2021 ◽  
pp. 324-331
Author(s):  
Dafei Wu

Firewall and intrusion detection system are widely used network security protection equipment, which plays a vital role in preventing network attack and intrusion. However, they have inevitable defects, which reduces the protection function provided in actual use. Therefore, in order to further improve network security, this paper designs a new network security protection technology which can integrate the advantages of multiple security technologies and make up for their shortcomings. This paper proposes a network security defense model based on the combination strategy of firewall and IPS. The purpose of policy based intrusion prevention system (pb-ips) is to realize the real combination of security management and network management system. This can take the network management system as the intermediary, integrate the firewall technology and intrusion detection technology, and realize a new network security protection measures.


2014 ◽  
Vol 998-999 ◽  
pp. 1113-1116
Author(s):  
Yun Peng Zhang

Today's network is becoming more and more multifarious, network attack and defense game between intensified, traditional network security defense schemes have been unable to effectively prevent and stop growing and complex application layer on the network attack. This scheme mainly focus on the application layer of network security, analyze the status of the application layer security, and then to vulnerability scanning to adapt to the current network environment security solutions, as well as the network security vulnerability scanning system design scheme. This scheme is applicable to medium enterprises network security planning and deployment, for enterprises in upgrading our network security, network planning and deployment time provides reference opinions.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


Sign in / Sign up

Export Citation Format

Share Document