{"title":"基于博弈论的网络安全行为模型","authors":"X. You, Shiyong Zhang","doi":"10.1109/PDCAT.2003.1236458","DOIUrl":null,"url":null,"abstract":"We study security interactive behavior between the hacker and the defender, under which an innovated new idea is emphasized. The process of attack and defend is supposed as the n different rational and noncooperative players under incomplete information, which is accord with n person incomplete information game. When the hackers attack the defender, they attempt to get their satisfied payoff, however, the defenders always hope to get their satisfied payoff, which will form the Nash equilibrium of game theory. The defenders can use the Nash equilibrium point to analysis and asset their security. The defenders can also use the Nash equilibrium as the reference of security investment.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"233 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":"{\"title\":\"A kind of network security behavior model based on game theory\",\"authors\":\"X. You, Shiyong Zhang\",\"doi\":\"10.1109/PDCAT.2003.1236458\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study security interactive behavior between the hacker and the defender, under which an innovated new idea is emphasized. The process of attack and defend is supposed as the n different rational and noncooperative players under incomplete information, which is accord with n person incomplete information game. When the hackers attack the defender, they attempt to get their satisfied payoff, however, the defenders always hope to get their satisfied payoff, which will form the Nash equilibrium of game theory. The defenders can use the Nash equilibrium point to analysis and asset their security. The defenders can also use the Nash equilibrium as the reference of security investment.\",\"PeriodicalId\":145111,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies\",\"volume\":\"233 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"37\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDCAT.2003.1236458\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDCAT.2003.1236458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A kind of network security behavior model based on game theory
We study security interactive behavior between the hacker and the defender, under which an innovated new idea is emphasized. The process of attack and defend is supposed as the n different rational and noncooperative players under incomplete information, which is accord with n person incomplete information game. When the hackers attack the defender, they attempt to get their satisfied payoff, however, the defenders always hope to get their satisfied payoff, which will form the Nash equilibrium of game theory. The defenders can use the Nash equilibrium point to analysis and asset their security. The defenders can also use the Nash equilibrium as the reference of security investment.