邓定胜, 罗 萍. 基于博弈论的信息安全成本代价优化[J]. 内江师范学院学报, 2014, (10): 28-32. DOI: 10.13603/j.cnki.51-1621/z.2014.10.006
    引用本文: 邓定胜, 罗 萍. 基于博弈论的信息安全成本代价优化[J]. 内江师范学院学报, 2014, (10): 28-32. DOI: 10.13603/j.cnki.51-1621/z.2014.10.006
    DENGDing-sheng, LUO Ping. Information Security Cost Optimization Based on the Game Theory[J]. Journal of Neijiang Normal University, 2014, (10): 28-32. DOI: 10.13603/j.cnki.51-1621/z.2014.10.006
    Citation: DENGDing-sheng, LUO Ping. Information Security Cost Optimization Based on the Game Theory[J]. Journal of Neijiang Normal University, 2014, (10): 28-32. DOI: 10.13603/j.cnki.51-1621/z.2014.10.006

    基于博弈论的信息安全成本代价优化

    Information Security Cost Optimization Based on the Game Theory

    • 摘要: 分析了信息安全存在的相互依存性,在着重研究主体间成本代价及安全损失的期望得益基础上,将主体的策略选择分为“投入安全成本”和“不投入安全成本”,根据得益矩阵建立起两个及多个主体选择安全成本代价的博弈模型,该模型使用纳什均衡分析为主体成本代价投入提供决策支持.针对这种情形,在确定如何运用信息安全成本投入来完善自身安全的同时,研究网络环境中主体间成本代价的联系,提出运用博弈论中的均衡来将选择投入信息安全成本的主体间的各个要素进行量化,转换为一个相对的多人博弈形式,从而得到信息安全成本投入问题的理论方法,有效的实现有限成本代价下的风险最小化.

       

      Abstract: An in-depth analysis is made of the interdependence concerning the information security. The priority is given to the study of the relationship between the cost and the expected benefits from the security loss among different agents. And the agent's choice of strategy can be the following two: to invest into security cost; or not invest into security cost. By means of the pay-off matrix, a game theoretical model is established for one agent or more agents. This model uses Nash equilibrium analysis to provide decision support for the agent's cost investment. When the problem of how to apply the information security cost investment to improve our own security is solved, effort is made to conduct the study of the cost relationship between the various network agents and it is suggested that the “equilibrium” in the game theory be used to quantify the relevant factors of the various agents who choose to invest into information security cost, thus to transform the model into a relative multiplayer game model so that a theoretical approach can be worked out for solving the problem of information security cost investment thus to achieve the effective risk minimization at a limited cost.

       

    /

    返回文章
    返回