[1] WU Z N, TIAN L Q, WANG Y, et al.Network security defense decision-making method based on stochastic game and deep reinforcement learning[J].Security and Communication Networks, 2021, 23(7):1-13. [2] 方滨兴.定义网络空间安全[J].网络与信息安全学报, 2018, 4(1):1-5. FANG B X.Define cyberspace security[J].Chinese Journal of Network and Information Security, 2018, 4(1):1-5.(in Chinese) [3] 胡瑞钦, 谭晶磊, 彭心荷, 等.面向SDN数据层的双虚假IP地址动态跳变技术[J].信息网络安全, 2022, 22(2):76-85. HU R Q, TAN J L, PENG X H, et al.Dynamic hopping technology of double virtual IP address for SDN data layer[J].Netinfo Security, 2022, 22(2):76-85.(in Chinese) [4] 习近平.在网络安全和信息化工作座谈会上的讲话[M].北京:人民出版社, 2016. XI J P.Speech at the symposium on network security and informatization[M].Beijing:People's Publishing House, 2016.(in Chinese) [5] LI X T.Decision making of optimal investment in information security for complementary enterprises based on game theory[J].Technology Analysis & Strategic Management, 2021, 33(7):755-769. [6] ETESAMI S R, BAŞAR T.Dynamic games in cyber-physical security:an overview[J].Dynamic Games and Applications, 2019, 9(4):884-913. [7] LIU X H, ZHANG H W, ZHANG Y C, et al.Optimal network defense strategy selection method based on evolutionary network game[J].Security and Communication Networks, 2020, 38(7):1-11. [8] CHEN X Y, LIU X T, ZHANG L, et al.Optimal defense strategy selection for spear-phishing attack based on a multistage signaling game[J].IEEE Access, 2019, 7:19907-19921. [9] LIU X H, ZHANG H W, ZHANG Y C, et al.Active defense strategy selection method based on two-way signaling game[J].Security and Communication Networks, 2019, 41(2):1-14. [10] AYDEGER A, MANSHAEI M H, RAHMAN M A, et al.Strategic defense against stealthy link flooding attacks:a signaling game approach[J].IEEE Transactions on Network Science and Engineering, 2021, 8(1):751-764. [11] XU X T, WANG G C, HU J T, et al.Study on stochastic differential game model in network attack and defense[J].Security and Communication Networks, 2020, 34(5):1-15. [12] 孙岩, 姬伟峰, 翁江, 等.基于微分博弈的移动目标防御最优策略[J].计算机研究与发展, 2021, 58(8):1789-1800. SUN Y, JI W F, WENG J, et al.Optimal strategy of moving target defense based on differential game[J].Journal of Computer Research and Development, 2021, 58(8):1789-1800.(in Chinese) [13] 杨峻楠, 张红旗, 张传富.基于随机博弈与改进WoLF-PHC的网络防御决策方法[J].计算机研究与发展, 2019, 56(5):942-954. YANG J N, ZHANG H Q, ZHANG C F.Network defense decision-making method based on stochastic game and improved WoLF-PHC[J].Journal of Computer Research and Development, 2019, 56(5):942-954.(in Chinese) [14] SAMIR M, AZAB M, SAMIR E.SD-CPC:SDN controller placement camouflage based on stochastic game for moving-target defense[J].Computer Communications, 2021, 168:75-92. [15] 金志刚, 王新建, 李根, 等.融合攻击图和博弈模型的网络防御策略生成方法[J].信息网络安全, 2021, 21(1):1-9. JIN Z G, WANG X J, LI G, et al.The generation method of network defense strategy combining with attack graph and game model[J].Netinfo Security, 2021, 21(1):1-9.(in Chinese) [16] 张恒巍, 黄健明.基于Markov演化博弈的网络防御策略选取方法[J].电子学报, 2018, 46(6):1503-1509. ZHANG H W, HUANG J M.Network defense strategy selection method based on Markov evolutionary game[J].Acta Electronica Sinica, 2018, 46(6):1503-1509.(in Chinese) [17] LIU Y H, CHEN H, ZHANG H, et al.Defense strategy selection model based on multistage evolutionary game theory[J].Security and Communication Networks, 2021, 49(4):1-15. [18] DIJK M, JUELS A, OPREA A, et al.FlipIt:the game of "stealthy takeover"[J].Journal of Cryptology, 2013, 26(4):655-713. [19] 谭晶磊, 张恒巍, 张红旗, 等.基于Markov时间博弈的移动目标防御最优策略选取方法[J].通信学报, 2020, 41(1):42-52. TAN J L, ZHANG H W, ZHANG H Q, et al.Optimal strategy selection approach of moving target defense based on Markov time game[J].Journal on Communications, 2020, 41(1):42-52.(in Chinese) [20] NOCHENSON A, GROSSKLAGS J.A behavioral investigation of the FlipIt game[EB/OL].[2021-12-05].https://www.researchgate.net/publication/263606042_A_Behavioral_Investigation_of_the_FlipIt_Game. [21] LASZKA A, HORVATH G, FELEGYHAZI M, et al.Modeling targeted attacks with for multiple resources[C]//Proccedings of International Conference on Decision and Game Theory for Security.Berlin, Germany:Springer, 2014:175-194. [22] JONES S, OUTKIN A, GEARHART J, et al.Evaluating moving target defense with PLADD[EB/OL].[2021-12-05].https://www.osti.gov/servlets/purl/1222986/. [23] 丁绍虎, 齐宁, 郭义伟.基于M-FlipIt博弈模型的拟态防御策略评估[J].通信学报, 2020, 41(7):186-194. DING S H, QI N, GUO Y W.Evaluation of mimic defense strategy based on M-FlipIt game model[J].Journal on Communications, 2020, 41(7):186-194.(in Chinese) [24] KERMACK W O, MCKENDRICK À.A contribution to the mathematical theory of epidemics[EB/OL].[2021-12-05].https://www.researchgate.net/publication/237076919_A_Contribution_to_the_Mathematical_Theory_of_Epidemics. [25] MYERSON R B.Game theory:analysis of conflict[EB/OL].[2021-12-05].https://www.researchgate.net/publication/220689692_Game_Theory_Analysis_of_Conflict. [26] 谢识予.经济博弈论(第4版)[M].上海:复旦大学出版社, 2017. XIE S Y.Economic game theory(the 4th Edition)[M].Shanghai:Fudan University Press, 2017.(in Chinese) [27] GORDON L, LOEB M, LUCYSHYN W, et al.CSI/FBI computer crime and security survey[EB/OL].[2021-12-05].https://www.researchgate.net/publication/243784811_CSIFBI_Computer_Crime_and_Security_Survey. |