Research Article

Network Attack and Defense Modeling and System Security Analysis: A Novel Approach Using Stochastic Evolutionary Game Petri Net

Table 1

Attack and defense behavior set.

PlayersActionSymbolDescription

AttackerScan_VulnerabilityVulnerability scan of network system
Crack_PasswordObtain user login information
Enhance_permissionEnhance the operating permission
Install_snifferInstall sniffer software to invade the host
Steal_informationSteal system confidential data resources

 Do nothing

DefenderIDS_scanDelete the threatening account and restart
Cheat_attackerRestore the network and delete the threatening account
Blockade_IPInstall sniffer monitoring program
Remove_snifferClear sniffer monitoring program
Do nothing