A Neural Network Model for Intrusion Detection Using a Game Theoretic Approach

被引:0
|
作者
Kaushik, Pallavi [1 ]
Dutta, Kamlesh [1 ]
机构
[1] NIT Hamirpur, Comp Sci & Engn, Hamirpur, Himachal Prades, India
关键词
Artificial intelligence; Game theory; Artificial neural network; Intrusion detection; LOAD;
D O I
10.1007/978-981-10-5780-9_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The problem of intrusion detection in the computer networks is not new and various methodologies have been formulated to address the same. A game-theoretic representation was also formulated, using one of the oldest game playing techniques, the minimax algorithm to solve this problem. It exploited the adversary like situation between the intruder and the Intrusion Detection System (IDS) and the essence of this approach lies in the assumption that the intruder and the IDS have complete knowledge of the network and each other's strategy. The solution for the intrusion detection problem via game theory gives the detection probability by which the IDS can detect the malicious packets on a given network when the probabilities with which the intruder sends the malicious packets on the various paths leading him to the target are known to the IDS. However, in the real world scenario, the role of the intruder and the IDS is dynamic, if the attack is detected or goes undetected the intruder tries to breach the network again with a different approach or the IDS tries to defend the network with a different strategy respectively. The next strategy for either of the two can be learnt by experience and thus, this paper, models an artificial neural network to represent this game-theoretic representation. The modeled neural network gives the detection probability of an attack by the IDS when the probabilities of sending malicious packets on the various paths leading the intruder to the target are given as an input pattern to the neural network.
引用
收藏
页码:355 / 367
页数:13
相关论文
共 50 条
  • [1] A game theoretic approach to decision and analysis in network intrusion detection
    Alpcan, T
    Basar, T
    [J]. 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, 2003, : 2595 - 2600
  • [2] A game theoretic approach to cooperative intrusion detection
    Guo, Yunchuan
    Zhang, Han
    Zhang, Lingcui
    Fang, Liang
    Li, Fenghua
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2019, 30 : 118 - 126
  • [3] Game Theoretic Approach towards Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 236 - 240
  • [4] A Game Theoretic Approach for Deploying Intrusion Detection Agent
    Chen, Yi-Ming
    Wu, Dachrahn
    Wu, Cheng-Kuang
    [J]. AGENT COMPUTING AND MULTI-AGENT SYSTEMS, 2009, 5044 : 446 - +
  • [5] A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection
    Liu, Yu
    Man, Hong
    Comaniciu, Cristina
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2201 - 2206
  • [6] Analysing Neural Network Topologies: a Game Theoretic Approach
    Stier, Julian
    Gianini, Gabriele
    Granitzer, Michael
    Ziegler, Konstantin
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018), 2018, 126 : 234 - 243
  • [7] A neural model for network intrusion detection
    Najarian, K
    Sun, XL
    Ahn, GJ
    Hadzikadic, M
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 554 - 559
  • [8] Maximizing the probability of intrusion detection by a fleet of mobile robots using an intelligent game theoretic approach
    Marzoughi, Ali
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8342 - 8348
  • [9] Control theoretic approach to intrusion detection using a distributed hidden Markov model
    Khanna, Rahul
    Liu, Huaping
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 24 - 33
  • [10] A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
    Patcha, A
    Park, JM
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 280 - 284