Abstract
In a complex network environment, this study introduces the susceptible sick removed model to solve the optimal defense action timing. By combining FlipIt game theory, a complex network attack and defense time game model is designed. The game equilibrium is solved and an algorithm for selecting the optimal defense time strategy is proposed. The data validate that the relationship between the sizes of PA and PD is different, corresponding to different defense effects. In a small world network with PA=5 and PD=3, the k value was 32. At 60 seconds, the proportion of I1 was 0.448, 0.280 higher than S1. In a network with PA=3 and PD=4, the proportion of infected nodes fluctuated between 0.670 and 0.850 as node proportion stabilized. Adjusting the time strategy dynamically significantly increased defense benefits. Compared to PD=4, a PD=6 defense strategy resulted in a 161.36% defense revenue increase. In the current complex network environment, the application of game theory can provide a foundation for methods of optimal defense timing decision-making. In the context of a complex Internet with small-world effects and scale-free characteristics in the real world, the research method has been demonstrated to effectively enhance network defense effectiveness by dynamically adjusting the time strategy.
References
Sikora L S, Lysa N K, Tsikalo Y I. and Fedevych O Y. System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security. Journal of Cyber Security and Mobility. 2023, 12(03), 389–414.
Del Rey A M, Vara R C, Gonzalez S R. A computational propagation model for malware based on the SIR classic model. Neurocomputing, 2022,484(May 1):161–171.
Zhang Y, Xu X, Shi Y. Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm. Journal of Cyber Security and Mobility. 2024, 13(03):439–60.
Xing H, Liu Y. Graph attention network for Car-Following Model under game between desired and real state. IET intelligent transport systems, 2022,16(6):800–812.
Yu Y, Peng W, Lu J. Wireless network security game based on conditional privacy policy. Computer communications, 2022,184(Feb.):96–106.
Hussain S S, Razak M F A, & Firdaus A. Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review. Journal of Cyber Security and Mobility, 2023, 13(01), 91–134.
Devalk K, Elmqvist N. Riverside: A design study on visualization for situation awareness in cybersecurity. Information visualization, 2024, 23(1):40–66.
Zhu Z, Chen M, Zhu Z Y. Effective defense strategies in network security using improved double dueling deep Q-network. Computers & Security, 2024, 136(1):103578–103589.
Al-Eiadeh M R, Abdallah M. PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs. International Journal of Information Security, 2025, 24(1):1–37.
Jena S, Padhy N P. Cyber-Secure Global Energy Equalization in DC Microgrid Clusters Under Data Manipulation Attacks. IEEE Transactions on Industry Applications, 2023, 59(5):5488–5505.
Teng Z, Zhu S, Li M, Yu L, Gu J, Guo L. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model. IET Communications, 2024, 18(1):55–62.
Gomez-Aguilar J F, Sabir Z, Saad U K M. Neuro-Evolutionary Computing Paradigm for the SIR Model Based on Infection Spread and Treatment. Neural processing letters, 2023, 55(4):4365–4396.
Al-Harbi O, Hamed A. A dual-stage deep learning model based on a sparse autoencoder and layered deep classifier for intrusion detection with imbalanced data. International Journal of Sensor Networks, 2024, 45(2):74–86.
Alhaj T A, Siraj M M, Zainal A, Idris I, Nazir A, Elhaj F, Darwish T. An effective attack scenario construction model based on identification of attack steps and stages. International Journal of Information Security, 2023, 22(5):1481–1496.
Harishkumar S, Bhuvaneswaran R S. Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM. Peer-to-Peer Networking and Applications, 2025, 18(1):1–20.
Rehman Z, Gondal I, Tari G Z. Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception. Computers & Security, 2024, 139(4):103685–103700.
Chui K T. Sustainable IoT Security in Entrepreneurship: Leveraging Univariate Feature Selection and Deep CNN Model for Innovation and Knowledge. Sustainability, 2024, 16(14):1–13.
Liu M, Zhang Z, Chen Y, Ge J, Zhao N. Adversarial Attack and Defense on Deep Learning for Air Transportation Communication Jamming. IEEE Transactions on Intelligent Transportation Systems, 2023, 25(1):973–986.
Abolfathi M, Inturi S, Jafarian B K H. Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples. Computers & Security, 2024, 139(4):103673–103687.
Baek F, Kim D, Park S, Kim H, Lee S. Conditional Generative Adversarial Networks with Adversarial Attack and Defense for Generative Data Augmentation. Journal of computing in civil engineering, 2022, 36(3):4022001–4022015.
Smarandache F. Plithogeny, plithogenic set, logic, probability and statistics: a short review. Journal of Computational and Cognitive Engineering, 2022, 1(2):47–50.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
