2020
DOI: 10.1155/2020/8824163
|View full text |Cite
|
Sign up to set email alerts
|

Game Theoretical Method for Anomaly-Based Intrusion Detection

Abstract: In this paper, the game theoretical analysis method is presented to provide optimal strategies for anomaly-based intrusion detection systems (A-IDS). A two-stage game model is established to represent the interactions between the attackers and defenders. In the first stage, the players decide to do actions or keep silence, and in the second stage, attack intensity and detection threshold are considered as two important strategic variables for the attackers and defenders, respectively. The existence, uniqueness… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Artificial intelligence can be trained to automatically learn complex features from data using deep learning algorithms that construct a deep hierarchical network. By adopting the proposed method, new features can be generated rapidly [16].…”
Section: Figure 1 Process Of Dimension Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Artificial intelligence can be trained to automatically learn complex features from data using deep learning algorithms that construct a deep hierarchical network. By adopting the proposed method, new features can be generated rapidly [16].…”
Section: Figure 1 Process Of Dimension Reductionmentioning
confidence: 99%
“…According to the analysis by Wang et al [16], the optimal strategy for anomaly-base intrusion detection systems can be determined using a game-theoretic analysis method. A twostage game model represents the attackers and defenders.…”
Section: Literature Surveymentioning
confidence: 99%
“…When the intrusion detector finds misbehavior, it can take appropriate actions immediately so that any harm to the system will be minimized [5]. At present, related research can be divided into misuse-based detection [6] and anomaly-based detection [7] according to detection technology. e misuse-based intrusion detection scheme matches the extracted network traffic with the data traffic, which has the existing type tags.…”
Section: Introductionmentioning
confidence: 99%