主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院

Chinese Journal of Management Science ›› 2026, Vol. 34 ›› Issue (2): 156-163.doi: 10.16381/j.cnki.issn1003-207x.2023.1778

Previous Articles     Next Articles

Research on Network Security Selecting Optimal Defense Strategies Based on Prospect Theory

Gaofeng Yu1, Dengfeng Li2()   

  1. 1.School of Business Administration,Fujian Business University,Fuzhou 350016,China
    2.School of Management and Economics,University of Electronic Science and Technology of China,Chengdu 611731,China
  • Received:2023-10-25 Revised:2024-03-31 Online:2026-02-25 Published:2026-02-04
  • Contact: Dengfeng Li E-mail:lidengfeng@uestc.edu.cn

Abstract:

With regards to cases of real network security management, the choice of security defence strategy is a common problem. However, the existing methods to choose security defence strategy is limited by the network administrators’ cognition and network topology. Therefore, an optimal way is proposed to select internet security defence strategy based on prospect theory. At first, several problems in optimizing defence strategy selection for sub-networks and calculates comprehensive prospect utility values for both the offensive and the defensive are described. Then, an optimal model is constructed for the choice of internet security strategy based on the prospect theory. This model considers the cost of defence and topology of network. Later, the optimal defence strategies are computed with different defence costs, network topology and the limited rationality of the defenders. Meanwhile, the influence law of defender rationality degree parameters on defense strategy optimization are researched. The optimal defence strategies model expands the application of offensive and defensive games, not only offers a new way to optimize the option of network security defence strategy against limited rationality, but also expands the application field of security game. Finally, a network security problem in logistic system is demonstrated as an example to prove the validity of the proposed method.

Key words: prospect theory, security game, defense strategy, network security

CLC Number: