Font Size: a A A

Dynamic Resource Allocation On Intrusion Detection Techniques For Information System Security Based On Colonel Blotto Game-theoretical Model

Posted on:2022-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2518306563979649Subject:Information management
Abstract/Summary:PDF Full Text Request
As one of the necessary methods for business operation,an information system can greatly reduce the cost of information transmission and improve the competitiveness of enterprises.However,the security vulnerabilities in the system can easily evolve into targets for intruders,causing irreparable losses.Enterprises need to invest a certain amount of resources to develop security defense technologies to resist external attacks to ensure the continuous and stable operation of the system.Generally,the security resources available to enterprises are limited;different types of information systems face different security threats,and the security defense technologies that should be adopted are different.How to select information system security defense technology and allocate a reasonable amount of resources with limited resources has aroused the attention of experts and scholars in the field.Therefore,from the perspective of game theory,this article explores the formulation of enterprise information system security strategies with the goal of minimizing security costs and maximizing defense effectiveness.The main tasks are as follows:(1)Constructed a colonel's game model to solve the security strategy of the information system.Regarding enterprises and intruders as defenders and attackers of the colonel's game,the security offensive and defensive technology correspond to the battlefield of the colonel's game,and the number of security resources is regarded as the soldiers in the colonel's game.Introduce the system's security defense technology preference coefficient,describe the difference in security defense technology adopted by different information systems,and define the scale of the information system.For information systems of different sizes,different model solving methods are used,and the game equilibrium obtained is used as the information system's Security defense technology selection and security resource allocation plan.And explored the impact of different initial condition parameters on the colonel's expected to return in the game.(2)Designed a co-evolutionary algorithm for solving the equilibrium solution of large-scale colonel games.The large-scale colonel game matrix is decomposed into a set of small-scale game matrices,and the linear programming solution of the small-scale game matrix set is used as the fitness,and the interaction between the attacker and the defender is considered to improve the expected return of the equilibrium approximate solution,Used to guide the formulation of large-scale information system security strategies.(3)Explored the changing laws of different resources on the enterprise e-commerce system and the security offensive and defensive strategies selected by the attackers.Analyze the technical preferences of the e-commerce system,and apply the algorithm for solving large-scale colonel games to the formulation of the e-commerce system security strategy.The verification result with the same type of algorithm shows the superiority of the security strategy derived from the algorithm in this paper.The final result shows that as a defender,enterprises tend to choose more types of security defense technologies and allocate security resources according to their preference.The higher the degree of technology,the greater the number of resources allocated.Through parameter analysis,it is known that participants can obtain more benefits in the offense and defense of large-scale information systems.Defenders and attackers can gain more benefits in the offense and defense of information systems by being able to expand the scale.Expanding the offense and defense of small-scale information systems is more likely to bring excess revenue.
Keywords/Search Tags:Security strategy, Colonel Blotto, coevolutionary algorithm, linear programming, resource allocation
PDF Full Text Request
Related items