Survey on optimization of deceptive defense strategies based on game theory

Yuan Ruomeng1,2,3
Fan Jing1,2,3
Peng Yu1,2,3
Xu Xing1,2,3
1. College of Electrical and Information Technology, Yunnan Minzu University, Kunming 650500, China
2. Yunnan Key Laboratory of Unmanned Autonomous System, Kunming 650500, China
3. Yunnan Key Laboratory of Information and Communication Security Disaster Recovery for Universities, Kunming 650500, China

Abstract

By growing sophistication of cybersecurity threats, traditional deceptive defense technologies struggle to counter APTs and complex network scenarios due to their insufficient dynamic adaptability in strategies. Game theory provides theoretical support for defense optimization by modeling the interactive dynamics of attack and defense strategies, yet it faces challenges such as state space explosion and inadequate modeling of incomplete information. The advancement of machine learning technology offers new approaches to address these issues. This paper systematically summarized the research progress in strategy selection methods for network deceptive defense, reviewed the current research status of deceptive defense and its gametheoretic methodologies, and proposed an integrated framework that combined game theory and machine learning for deceptive defense strategy design while introducing typical application scenarios. Additionally, it analyzed and forecasted the integrated methods of game theory and machine learning, and concluded with a comprehensive summary of the entire study. This research aims to provide a reference for constructing a defense system that balances theoretical interpretability and practical applicability.

Foundation Support

国家自然科学基金资助项目(12361104)
教育部新一代信息技术创新项目(2023IT077)
云南省吴中海专家工作站(202305AF150045)
CCF-深信服“远望”科研基金资助项目(20240210)
云南省基础计划研究项目(202401AT070036)
云南省国际联合创新平台项目(202403AP14001)
云南省教育厅科学研究基金资助项目(2025Y0670)
云南省教育科学规划项目(BC24012)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2025.06.0199
Publish at: Application Research of Computers Printed Article, Vol. 43, 2026 No. 1
Section: Survey
Pages: 1-10
Serial Number: 1001-3695(2026)01-001-0001-10

Publish History

[2025-09-17] Accepted Paper
[2026-01-05] Printed Article

Cite This Article

原若萌, 范菁, 彭渝, 等. 基于博弈论的欺骗性防御策略优化研究综述 [J]. 计算机应用研究, 2026, 43 (1): 1-10. (Yuan Ruomeng, Fan Jing, Peng Yu, et al. Survey on optimization of deceptive defense strategies based on game theory [J]. Application Research of Computers, 2026, 43 (1): 1-10. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)