Font Size: a A A

Research Of Network Decoy System Based On Game Theory

Posted on:2007-12-22Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiFull Text:PDF
GTID:2179360182991176Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Along with computer network application day by day widespread, enterprises and the dependence on computer network of daily life are greater and greater, but the network security event often occurs, cause great losses to injured enterprises and individual.The traditional safe protection method depends on the existing cognition that is attacked, basic has not protected the effect to the unknown attack, moreover these technologies are been more and more familiar by the hackers. The honeypot took as one kind of new security tool in the attack examination, the analysis, the research, has the superior performance in particular to the unknown attack capture aspect。This paper make some study to relevant key technology of honeypot, have a certain and positive effect on better arrangement online security defence system. Propose one establishment of recommendation decoy environment based on interest measure at first, after introduced the concept invasion decoy and its system structure, based on research in collaborative filtering, propose a model that give a recommendation to establishment to decoy environment with interest measure and collaborative filtering in coordination, for the attack of more attraction hackers , carry on research to them;The honeypot system work in the strict resistance environment, decoy information acquisition and intruder's visit behavior visible for net space resistance gambling, therefore formulates one kind information acquisition strategy choice method based on the incompletion information dynamic gambling. This method based on characteristic that resistance dynamic and both resistance sides information incompletion,Combine with information acquisition of network decoy system and incompletion information dynamic gambling.The demonstration and the simulation had initially proven the model accuracy and is effective;The usual honeypot decoy system collection the data distribution to deposit in the system, moreover distributes between the information has the certain conflict and the cooperation relations, we may regard the honeypot information fusionprocess as information gambling process, Combine with the game theory and the information fusion theory, Thus obtains the most superior security decision-making of information fusion. This research used the brand-new way to carry on the fusion to the multiple source information, have certain effect on network forewarned. Finally, a new model for treat assessment based on fuzzy matrix game theory are presented in this paper. By analyzing the fuzzy matrix game theory and threat assessment mechanism,and combine the fuzzy concept and gambling model, and will obtain the successful application in the network security active defense system.The paper carry on some research work revolved in the essential technology of the honeypot, got up a positive role for the better arrangement network security defense system, and do some help for the game theory applied in network security.
Keywords/Search Tags:Network decoy, Interest measure, Game theory, Information fusion, Security evaluation
PDF Full Text Request
Related items