A game theoretic model for dynamic configuration of large-scale intrusion detection signatures

被引:0
|
作者
Xaiver Jerald Punithan
Jong-Deok Kim
Dongseok Kim
Yoon-Ho Choi
机构
[1] SNU,School of Electrical and Computer Engineering
[2] School of Computer Science and Engineering,undefined
[3] PNU,undefined
[4] Department of Mathematics,undefined
[5] KGU,undefined
来源
关键词
Game; Network security; Intrusion detection signature; Dynamic configuration;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we note that the signature-based intrusion detection system (S-IDS) can cause the low accuracy against mutants of intrusion packets. This is because the S-IDS commonly detects network intrusion in data flows by identifying the existence of the predefined intrusion signatures, which is called static intrusion signature configuration (SISC). To increase the accuracy, all intrusion signatures corresponding to all possible mutants of a pertinent attack may be activated. However, the static intrusion signature configuration with all possible intrusion signatures can largely increase the size of storage and the signature search time in the process of signature analysis. To solve the problems that occur when activating all possible intrusion signatures, we propose a two-player non-cooperative zero-sum game with incomplete information for dynamic intrusion signature configuration (DISC), where the various lengths of an intrusion signature have been activated in a time-shared manner. After formulating the problem into the game theoretic approach, we found the optimal strategy for DISC in the S-IDS. To the best of our knowledge, this work is the first approach that analyzes the optimal DISC strategy against the various mutants of intrusion packets. From evaluation results, we show that the DISC by the defender is more effective than the SISC against various mutants of intrusion packets by the intruder.
引用
收藏
页码:15461 / 15477
页数:16
相关论文
共 50 条
  • [21] A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks
    Esposito, Christian
    Castiglione, Aniello
    Palmieri, Francesco
    Ficco, Massimo
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 353 - 364
  • [22] A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection
    Liu, Yu
    Man, Hong
    Comaniciu, Cristina
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2201 - 2206
  • [23] A game theoretic analysis of intrusion detection in access control systems
    Alpcan, T
    Basar, T
    2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 1568 - 1573
  • [24] A Game-Theoretic Perspective on Resource Management for Large-Scale UAV Communication Networks
    Jiaxin Chen
    Ping Chen
    Qihui Wu
    Yuhua Xu
    Nan Qi
    Tao Fang
    China Communications, 2021, 18 (01) : 70 - 87
  • [25] A sequential cooperative game theoretic approach to scheduling multiple large-scale applications in grids
    Duan, Rubing
    Prodan, Radu
    Li, Xiaorong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 27 - 43
  • [26] Game-Theoretic Lightweight Autoencoder Design for Intrusion Detection
    Rheey, Joohong
    Park, Hyunggon
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [27] Large-scale network intrusion detection based on distributed learning algorithm
    Tian, Daxin
    Liu, Yanheng
    Xiang, Yang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 25 - 35
  • [28] Large-scale network intrusion detection algorithm based on distributed learning
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (04): : 993 - 1003
  • [29] Fuzzy generalized Hebbian algorithm for large-scale intrusion detection system
    Ali, Ahmed Hussein
    Aljanabi, Mohammad
    Ahmed, Munef Abdullah
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2020, 12 (01): : 81 - 90
  • [30] Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks
    Chen, Changlong
    Song, Min
    Hsieh, George
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 711 - +