A game theoretic model for dynamic configuration of large-scale intrusion detection signatures

被引:0
|
作者
Xaiver Jerald Punithan
Jong-Deok Kim
Dongseok Kim
Yoon-Ho Choi
机构
[1] SNU,School of Electrical and Computer Engineering
[2] School of Computer Science and Engineering,undefined
[3] PNU,undefined
[4] Department of Mathematics,undefined
[5] KGU,undefined
来源
关键词
Game; Network security; Intrusion detection signature; Dynamic configuration;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we note that the signature-based intrusion detection system (S-IDS) can cause the low accuracy against mutants of intrusion packets. This is because the S-IDS commonly detects network intrusion in data flows by identifying the existence of the predefined intrusion signatures, which is called static intrusion signature configuration (SISC). To increase the accuracy, all intrusion signatures corresponding to all possible mutants of a pertinent attack may be activated. However, the static intrusion signature configuration with all possible intrusion signatures can largely increase the size of storage and the signature search time in the process of signature analysis. To solve the problems that occur when activating all possible intrusion signatures, we propose a two-player non-cooperative zero-sum game with incomplete information for dynamic intrusion signature configuration (DISC), where the various lengths of an intrusion signature have been activated in a time-shared manner. After formulating the problem into the game theoretic approach, we found the optimal strategy for DISC in the S-IDS. To the best of our knowledge, this work is the first approach that analyzes the optimal DISC strategy against the various mutants of intrusion packets. From evaluation results, we show that the DISC by the defender is more effective than the SISC against various mutants of intrusion packets by the intruder.
引用
收藏
页码:15461 / 15477
页数:16
相关论文
共 50 条
  • [1] A game theoretic model for dynamic configuration of large-scale intrusion detection signatures
    Punithan, Xaiver Jerald
    Kim, Jong-Deok
    Kim, Dongseok
    Choi, Yoon-Ho
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 15461 - 15477
  • [2] The simulation and analysis of the large-scale intrusion detection model in shuffle networks
    Likewei
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2878 - 2881
  • [3] Intrusion and misuse detection in large-scale systems
    Erbacher, RF
    Walker, KL
    Frincke, DA
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2002, 22 (01) : 38 - 47
  • [4] Intrusion and misuse detection in large-scale systems
    Erbacher, Robert F.
    Walker, Kenneth L.
    Frincke, Deborah A.
    Pollution Engineering, 2002, 34 (02) : 40 - 48
  • [5] Game theoretic analysis for large-scale networks and traffic data
    Daniel Bo-Wei Chen
    Wen Ji
    Yong Liu
    The Journal of Supercomputing, 2015, 71 : 3215 - 3216
  • [6] Game theoretic analysis for large-scale networks and traffic data
    Chen, Daniel Bo-Wei
    Ji, Wen
    Liu, Yong
    JOURNAL OF SUPERCOMPUTING, 2015, 71 (09): : 3215 - 3216
  • [7] A Neural Network Model for Intrusion Detection Using a Game Theoretic Approach
    Kaushik, Pallavi
    Dutta, Kamlesh
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 355 - 367
  • [8] A game theoretic approach to cooperative intrusion detection
    Guo, Yunchuan
    Zhang, Han
    Zhang, Lingcui
    Fang, Liang
    Li, Fenghua
    JOURNAL OF COMPUTATIONAL SCIENCE, 2019, 30 : 118 - 126
  • [9] Game Theoretic Approach towards Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 236 - 240
  • [10] The architecture of the large-scale distributed intrusion detection system
    Chu, YG
    Li, J
    Yang, YX
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 130 - 132