• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用博弈论模型防御网络基础设施免受网络物理攻击

Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

作者信息

Rao Nageswara S V, Poole Stephen W, Ma Chris Y T, He Fei, Zhuang Jun, Yau David K Y

机构信息

Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN, USA.

Advanced Digital Sciences Center, Singapore.

出版信息

Risk Anal. 2016 Apr;36(4):694-710. doi: 10.1111/risa.12362. Epub 2015 Apr 6.

DOI:10.1111/risa.12362
PMID:25847370
Abstract

The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

摘要

网络基础设施的运行依赖于网络和物理组件,这些组件会受到各种偶然和蓄意的损害。在网络和计算基础设施的背景下,我们使用考虑了网络和物理组件的博弈论模型来研究攻击者和防御者之间的战略互动。攻击者和防御者优化各自的效用,效用表示为成本和系统项的总和。首先,我们考虑一个布尔攻防模型,其中网络和物理子基础设施可以作为单个单元受到攻击和加固。其次,我们考虑一个组件攻防模型,其中其组件可以受到攻击和防御,并且基础设施需要两者的最小数量才能运行。我们表明,在两种情况下统一成本下的纳什均衡在多项式时间内是可计算的,并且它为基础设施的生存提供了高级确定性条件。当成功攻击和防御的概率以及偶然故障的概率被纳入模型时,结果对攻击者有利,但在其他方面保持定性相似。这种方法受到了我们在UltraScience Net基础设施方面经验的启发和验证,该基础设施是为支持高性能网络实验而构建的。然而,分析结果更具一般性,我们将其应用于云和高性能计算基础设施的简化模型。

相似文献

1
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.使用博弈论模型防御网络基础设施免受网络物理攻击
Risk Anal. 2016 Apr;36(4):694-710. doi: 10.1111/risa.12362. Epub 2015 Apr 6.
2
Defense Strategies for Asymmetric Networked Systems with Discrete Components.离散组件下非对称网络系统的防御策略。
Sensors (Basel). 2018 May 3;18(5):1421. doi: 10.3390/s18051421.
3
Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.网络韧性:对英国和美国所应用的关键国家基础设施及网络安全保护措施的综述
J Bus Contin Emer Plan. 2013;7(2):149-62.
4
Attacker-defender game from a network science perspective.从网络科学视角看攻防博弈
Chaos. 2018 May;28(5):051102. doi: 10.1063/1.5029343.
5
What good cyber resilience looks like.良好的网络弹性是什么样的。
J Bus Contin Emer Plan. 2013;7(2):112-25.
6
How is cyber threat evolving and what do organisations need to consider?网络威胁是如何演变的,组织需要考虑哪些因素?
J Bus Contin Emer Plan. 2013;7(2):163-71.
7
Defending Against Advanced Persistent Threats Using Game-Theory.运用博弈论抵御高级持续性威胁
PLoS One. 2017 Jan 3;12(1):e0168675. doi: 10.1371/journal.pone.0168675. eCollection 2017.
8
Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.考虑合理性演化的针对网络攻击的保护资源分配优化的多阶段攻防图博弈分析
Risk Anal. 2022 May;42(5):1086-1105. doi: 10.1111/risa.13837. Epub 2021 Oct 11.
9
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
10
Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.关键基础设施系统中信息不对称下的斯塔克尔伯格博弈:基于复杂网络视角
Chaos. 2019 Aug;29(8):083129. doi: 10.1063/1.5100849.

引用本文的文献

1
The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.工作厌恶型网络攻击者模型:来自两百万攻击特征的理论与证据。
Risk Anal. 2022 Aug;42(8):1623-1642. doi: 10.1111/risa.13732. Epub 2021 May 7.
2
An Adversarial Risk Analysis Framework for Cybersecurity.一种用于网络安全的对抗风险分析框架。
Risk Anal. 2021 Jan;41(1):16-36. doi: 10.1111/risa.13331. Epub 2019 Jun 10.
3
Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.
基于随机反事实风险分析的电网基础设施网络中电力线通信网络脆弱性评估
Risk Anal. 2019 Sep;39(9):2012-2031. doi: 10.1111/risa.13291. Epub 2019 Feb 27.
4
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.博弈论与无线传感器网络安全需求及威胁缓解:一项综述
Sensors (Basel). 2016 Jun 29;16(7):1003. doi: 10.3390/s16071003.