Proceedings of the 48h IEEE Conference on Decision and Control (CDC) Held Jointly With 2009 28th Chinese Control Conference 2009
DOI: 10.1109/cdc.2009.5399894
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic policy-based IDS configuration

Abstract: Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection of attacks is far from trivial. There exists a tradeoff between security enforcement levels and the performance of information systems. It is critical to configure an IDS in a dynamic and iterative fashion to balance the security overhead and system performance. In this paper, we use noncooperative game approaches to address this prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 68 publications
(49 citation statements)
references
References 13 publications
0
49
0
Order By: Relevance
“…As shown in [11] for general Markov games and in [12] for zero-sum games, there is indeed convergence under certain conditions on the learning rate β t :…”
Section: Q-learningmentioning
confidence: 75%
See 2 more Smart Citations
“…As shown in [11] for general Markov games and in [12] for zero-sum games, there is indeed convergence under certain conditions on the learning rate β t :…”
Section: Q-learningmentioning
confidence: 75%
“…Q-learning in games, on the other hand, has been introduced by Littman in [11] and more thoroughly discussed in [13]. In [12], convergence results are obtained for zero sum games by applying results from Littman and Szepesvari [13], an approach we take in our framework as well.…”
Section: Q-learningmentioning
confidence: 99%
See 1 more Smart Citation
“…An example is Stuxnet, a Windows-based worm that was recently discovered to target industrial software and equipment [10]. An administrator can enforce the security by dynamically updating the security policy of control systems [11], [12]. Once an attack occurs, the administrator can restore the system to normal operation.…”
Section: A Control Frameworkmentioning
confidence: 99%
“…The survey [6] provides a selected set of works that use game-theoretic approaches in computer networks security and privacy problems. Zhu et al define a zero-sum stochastic game for the design of an Intrusion Detection System (IDS) and provide the stationary optimal strategy [7]. Robust algorithms against well-defined uncertainties are presented in [8].…”
Section: Introductionmentioning
confidence: 99%