A game theoretic approach based on intrusion tolerant systems

被引:0
|
作者
Sanoussi, Nouhad [1 ]
Orhanou, Ghizlane [1 ]
El Hajji, Said [1 ]
机构
[1] Laboratory of Mathematics, Computing and Applications - Information Security, Faculty of Sciences, Mohammed V University in Rabat, RP, Rabat,BP1014, Morocco
来源
关键词
Game theory;
D O I
暂无
中图分类号
学科分类号
摘要
Despite the enormous efforts made to guarantee a great level of security in the network, this is still far from being completely solved. Hence, to continue providing proper services in threatening environments there is a need for intrusion tolerance. The purpose of an intrusion tolerant system (ITS) is to survive against every intrusion, rather than to prevent them. Unfortunately, these mechanisms of defence require a huge investment and an accurate study of the network to effectively secure the infrastructure. The weakness of the traditional network security solutions is that they lack a quantitative decision framework. Game theory approaches proved their efficiency in this issue. Therefore, in this paper, we propose a game theoretic approach to model the attack-defence interaction in taking into account both internal and external attacks and analyse the effect of intrusion tolerant system on the payoff of both the internal and external attacker and the defender. A MATLAB simulation is used to illustrate the game model and calculate the frequency of attack strategy and invest in tolerance strategy. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:175 / 181
相关论文
共 50 条
  • [31] Game Theoretic Approach to Spectrum Allocation for Weak Interference Systems
    von Wrycza, Peter
    Shankar, M. R. Bhavani
    Bengtsson, Mats
    Ottersten, Bjorn
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [32] A Game Theoretic Approach Based Access Control Mechanism
    Zhao, Ming
    Ren, Jinqiang
    Sun, Huiping
    Li, Suming
    Chen, Zhong
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1464 - +
  • [33] A Game-Theoretic approach to Fault Diagnosis of Hybrid Systems
    Bresolin, Davide
    Capiluppi, Marta
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (54): : 237 - 249
  • [34] Game Theoretic Approach to Similarity Based Image Segmentation
    Shen, Dan
    Chen, Genshe
    Zheng, Yufeng
    Blasch, Erik
    Pham, Khanh
    [J]. SIGNAL AND DATA PROCESSING OF SMALL TARGETS 2011, 2011, 8137
  • [35] Intrusion tolerant systems workshop
    Landwehr, CE
    Bellovin, SM
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 785 - 786
  • [36] Maximizing the probability of intrusion detection by a fleet of mobile robots using an intelligent game theoretic approach
    Marzoughi, Ali
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8342 - 8348
  • [37] GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks
    Zhu, Quanyan
    Fung, Carol
    Boutaba, Raouf
    Basar, Tamer
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (11) : 2220 - 2230
  • [38] A Multiagent-Based Game-Theoretic and Optimization Approach for Market Operation of Multimicrogrid Systems
    Esfahani, Mohammad Mahmoudian
    Hariri, Abla
    Mohammed, Osama A.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (01) : 280 - 292
  • [39] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [40] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090