A Game Theoretic Approach for Deploying Intrusion Detection Agent

被引:0
|
作者
Chen, Yi-Ming [1 ]
Wu, Dachrahn [2 ]
Wu, Cheng-Kuang [1 ]
机构
[1] Natl Cent Univ, Dept Informat Management, Chungli 320, Taiwan
[2] Natl Cent Univ, Dept Econ, Chungli, Taiwan
来源
关键词
Agent deployment; Nash equilibrium; Shapley value; threat levels;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value to compute the Shapley value of intrusion detection agent under the various threat levels. Therefore, the fair agent allocation creates a minimum set of IDS deployment costs. Numerical examples show that the network administrator can quantitatively evaluate the security risk of each intrusion detection agent and easily select the most effective IDS agent deployment to meet the various threat levels.
引用
收藏
页码:446 / +
页数:2
相关论文
共 50 条
  • [31] A mobile agent approach to intrusion detection in network systems
    Kolaczek, G
    Pieczynska-Kuchtiak, A
    Juszczyszyn, K
    Grzech, A
    Katarzyniak, RP
    Nguyen, NT
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 514 - 519
  • [32] A GAME THEORETIC BIDDING AGENT FOR THE AD AUCTION GAME
    Vorobeychik, Yevgeniy
    [J]. ICAART 2011: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, 2011, : 35 - 44
  • [33] Agents playing Hotelling’s game: an agent-based approach to a game theoretic model
    Eveline van Leeuwen
    Mark Lijesen
    [J]. The Annals of Regional Science, 2016, 57 : 393 - 411
  • [34] A linguistic/game-theoretic approach to detection/explanation of propaganda
    Barfar, Arash
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
  • [35] Agents playing Hotelling's game: an agent-based approach to a game theoretic model
    van Leeuwen, Eveline
    Lijesen, Mark
    [J]. ANNALS OF REGIONAL SCIENCE, 2016, 57 (2-3): : 393 - 411
  • [36] A Game-Theoretic Approach for Community Detection in Signed Networks
    Wang, Shuaihui
    Hu, Guyu
    Pan, Zhisong
    Zhang, Jin
    Li, Dong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (06) : 796 - 807
  • [37] A Game-Theoretic Approach for Threats Detection and Intervention in Surveillance
    Ma, Wenjun
    Liu, Weiru
    Miller, Paul
    Luo, Xudong
    [J]. AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, : 1565 - 1566
  • [38] A game-theoretic approach to credit card fraud detection
    Vatsa, V
    Sural, S
    Majumdar, AK
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 263 - 276
  • [39] Hardware Trojan Detection Game: A Prospect-Theoretic Approach
    Saad, Walid
    Sanjab, Anibal
    Wang, Yunpeng
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) : 7697 - 7710
  • [40] A Game-Theoretic Approach to Sequential Detection in Adversarial Environments
    Zhang, Ruizhi
    Zou, Shaofeng
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1153 - 1158