Advanced Search
Volume 35 Issue 8
Sep.  2013
Turn off MathJax
Article Contents
Zhou Hua, Zhou Hai-Jun, Ma Jian-Feng. Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory[J]. Journal of Electronics & Information Technology, 2013, 35(8): 1933-1939. doi: 10.3724/SP.J.1146.2012.01081
Citation: Zhou Hua, Zhou Hai-Jun, Ma Jian-Feng. Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory[J]. Journal of Electronics & Information Technology, 2013, 35(8): 1933-1939. doi: 10.3724/SP.J.1146.2012.01081

Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory

doi: 10.3724/SP.J.1146.2012.01081
  • Received Date: 2012-08-23
  • Rev Recd Date: 2013-04-15
  • Publish Date: 2013-08-19
  • Intrusion tolerance is a new mechanism used to build secure computer networks. Therefore, its very important to analyze and evaluate the security performance of intrusion tolerant networks before intrusion tolerance is absolutely adopted. Thus, a security analysis model of intrusion tolerant systems based on game theory is proposed in this paper. According to the analysis model, the processes between attacking and tolerating intrusions are considered as a two-player zero-sum stochastic game, in which the optimal action strategies and expected payoffs of the two parties are studied. By using the study results, this paper analyzes the availability, confidentiality and integrality of intrusion-tolerance systems from the perspective of mean time to failure. Meanwhile, it analyzes the factors that will affect the attackers choices about action strategies, and obtains the relationships between attack will, payoff and action strategy. The results present the underlying interconnections between intrusion tolerant systems and attackers, which will provide helpful references to withstand the network attacks and intrusions.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2659) PDF downloads(971) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return