Open Access

Experimentation and analysis of network anti-mapping security access techniques for illegal scanning


Cite

With the rapid development of network technology, the increasing scale of the network, and the more complex network structure, network anti-mapping puts forward higher requirements. In this paper, based on the game theory of the network anti-mapping strategy selection method, the network mapping attack is divided into the reconnaissance stage and the mapping stage. According to the opacity of the information of both attackers and defenders, the attacker collects the defender’s information in the reconnaissance stage and introduces the signal game to construct the reconnaissance game model. The attacker and defender in the two-stage game utilize Bayesian equilibrium to solve the problem and select the strategy that maximizes their utility based on the assumed conditions. The results show that for the attack of illegal scanning, the CFE statistics of the attack data increase from 1.5~1.9. The game theory-based network anti-surveillance security access technology can effectively identify subnet and multi-IP devices and, at the same time, reduce the network load, and the network topology nodes can be up to 2134 degrees of freedom, which effectively improves the efficiency of network anti-surveillance.

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics