检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:宋丽华 张津威 张少勇 SONG Lihua;ZHANG Jinwei;ZHANG Shaoyong(Institute of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China)
机构地区:[1]中国人民解放军陆军工程大学指挥控制工程学院,南京210007
出 处:《信息网络安全》2023年第11期38-47,共10页Netinfo Security
基 金:国家自然科学基金[62172432]。
摘 要:物联网设备数量迅速增多使得针对物联网的攻击越来越多,网络安全人员急需使用主动防御技术将被动转化为主动。SSH(Secure Shell)蜜罐技术的引入让防御方能够捕获攻击者的交互信息,对物联网安全具有十分重要的意义。然而,传统蜜罐由于特征或行为模式固定,很容易被攻击者识别和利用。文章从博弈论的角度出发,建立蜜罐与攻击者的交互模型,并使用SAC(Soft Actor-Critic)算法进行求解,通过计算得到防御方的最佳响应策略。仿真结果表明,将强化学习与博弈论相结合的自适应蜜罐能够在多种场景下快速找出最优交互策略,并且加入策略网络的强化学习方法与攻击者的交互收益要优于仅基于价值网络的传统强化学习方法。The proliferation of IoT devices has led to an increasing number of attacks against the Internet of things,it’s urgent for cybersecurity personnel to use proactive defense techniques to turn reactive defense into proactive defense.The introduction of SSH(secure shell)honeypot technology allows defenders to capture learn attackers’interaction informationacting strategy,which is of great significance for IoT security.However,traditional honeypots are easily identified and exploited by attackers because of their fixed characteristics or behavioral patterns.From the perspective of game theory,this paper established an interaction model between honeypots and attackers,and we calculated the best response strategy of the defender by useing SAC(soft actor-critic)algorithm.Simulation results show that adaptive honeypot by combining reinforcement learning and game theory can quickly find the optimal interaction strategy in a variety of scenarios,and the reinforcement learning method added to the policy network is better than the traditional reinforcement learning method based on the value network alone.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49