Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory

2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.

2014 ◽  
Vol 687-691 ◽  
pp. 2007-2010
Author(s):  
Xiao Ru Sun

With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.


Author(s):  
Cunbin Li ◽  
Ding Liu ◽  
Yi Wang ◽  
Chunyan Liang

AbstractAdvanced grid technology represented by smart grid and energy internet is the core feature of the next-generation power grid. The next-generation power grid will be a large-scale cyber-physical system (CPS), which will have a higher level of risk management due to its flexibility in sensing and control. This paper explains the methods and results of a study on grid CPS’s behavior after risk. Firstly, a behavior model based on hybrid automata is built to simulate grid CPS’s risk decisions. Then, a GCPS risk transfer model based on cooperative game theory is built. The model allows decisions to ignore complex network structures. On this basis, a modified applicant-proposing algorithm to achieve risk optimum is proposed. The risk management model proposed in this paper can provide references for power generation and transmission decision after risk as well as risk aversion, an empirical study in north China verifies its validity.


2021 ◽  
Vol 145 ◽  
pp. 111056
Author(s):  
Andrey Churkin ◽  
Janusz Bialek ◽  
David Pozo ◽  
Enzo Sauma ◽  
Nikolay Korgin

2021 ◽  
Vol 50 (1) ◽  
pp. 78-85
Author(s):  
Ester Livshits ◽  
Leopoldo Bertossi ◽  
Benny Kimelfeld ◽  
Moshe Sebag

Database tuples can be seen as players in the game of jointly realizing the answer to a query. Some tuples may contribute more than others to the outcome, which can be a binary value in the case of a Boolean query, a number for a numerical aggregate query, and so on. To quantify the contributions of tuples, we use the Shapley value that was introduced in cooperative game theory and has found applications in a plethora of domains. Specifically, the Shapley value of an individual tuple quantifies its contribution to the query. We investigate the applicability of the Shapley value in this setting, as well as the computational aspects of its calculation in terms of complexity, algorithms, and approximation.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Sign in / Sign up

Export Citation Format

Share Document