ID 原文 译文
4483 首先,给出动态伪装网络定义并描述基于动态伴随网络的主动欺骗攻防场景; The definition of DCN was given firstly, and then the attacker-defender scenario of active deception based on DCN was de-scribed.
4484 然后,在分析攻防交互过程的基础上,构建信号博弈模型来指导最优欺骗策略选取; Next, the interaction process of the attacker-defender scenario was modeled by using a signaling game, whoseequilibrium can guide the selection of optimal deception strategy.
4485 进一步,设计基于双层威胁渗透图的攻防策略收益量化方法; Furthermore, to quantify the payoffs accurately, thetwo-layer threat penetration graph (TLTPG) was introduced.
4486 最后,提出一种统一纯策略与混策略的博弈均衡求解方法。 Finally, the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.
4487 实验结果表明,基于动态伪装网络,精炼贝叶斯均衡能够为防御者实施最优防御策略提供有效指导,实现防御者收益最大化。 The experimental results show that,based on the dynamic camouflage network, the perfect Bayesian equilibrium can provide effective guidance for the de-fender to implement the optimal defense strategy and maximize the benefits of the defender.
4488 此外,还总结了利用动态伪装网络进行主动欺骗防御的特点与规律。 In addition, the characteris-tics and rules of active deception defense DCN-based are summarized.
4489 针对复杂网络环境下访问控制策略冗余与冲突检测、访问控制策略评估的效率面临的严峻挑战,提出了基于属性轻量级可重构的访问控制策略。 Aiming at the severe challenges of access control policy redundancy and conflict detection, the efficiency ofaccess control policy evaluation in complex network environment, an attribute-based lightweight reconfigurable access con-trol policy was proposed.
4490 以基于属性的访问控制策略为范例,根据访问控制策略中的操作类型、主体属性、客体属性和环境属性将基于属性的访问控制策略划分为多个不相交的原子访问控制规则,并通过与、或等逻辑关系构成的代数表达式,将原子访问控制规则重构出复杂访问控制策略; Taking the attribute-based access control policy as an example, the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type, subject attribute, objectattribute, and environment attribute in the access control policy. Complex access control policies were constructed throughatomic access control rules and an algebraic expression formed by AND, OR logical relationships.
4491 提出原子访问控制规则冗余与冲突检测方法,将复杂访问控制策略分解为等效的原子访问控制规则和代数表达式,通过对等效的原子访问控制规则和代数表达式进行冗余与冲突检测实现对复杂访问控制策略进行冗余与冲突检测; A method for redundancya nd collision detection of atomic access control rules was proposed. A method was proposed for decompose a complexaccess control policy into equivalent atomic access control rules and an algebraic expression. The method for redundancyand collision detection of complex access control policies were proposed through redundancy and collision detection ofequivalent atomic access control rules and algebraic expressions.
4492 从时间复杂度和空间复杂度 2 个不同角度对等效转化的访问控制策略进行评估。 From time complexity and space complexity, the efficiencyof the equivalent transformation access control policy was evaluated.