A game theoretic model for dynamic configuration of large-scale intrusion detection signatures

被引:0
|
作者
Xaiver Jerald Punithan
Jong-Deok Kim
Dongseok Kim
Yoon-Ho Choi
机构
[1] SNU,School of Electrical and Computer Engineering
[2] School of Computer Science and Engineering,undefined
[3] PNU,undefined
[4] Department of Mathematics,undefined
[5] KGU,undefined
来源
关键词
Game; Network security; Intrusion detection signature; Dynamic configuration;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we note that the signature-based intrusion detection system (S-IDS) can cause the low accuracy against mutants of intrusion packets. This is because the S-IDS commonly detects network intrusion in data flows by identifying the existence of the predefined intrusion signatures, which is called static intrusion signature configuration (SISC). To increase the accuracy, all intrusion signatures corresponding to all possible mutants of a pertinent attack may be activated. However, the static intrusion signature configuration with all possible intrusion signatures can largely increase the size of storage and the signature search time in the process of signature analysis. To solve the problems that occur when activating all possible intrusion signatures, we propose a two-player non-cooperative zero-sum game with incomplete information for dynamic intrusion signature configuration (DISC), where the various lengths of an intrusion signature have been activated in a time-shared manner. After formulating the problem into the game theoretic approach, we found the optimal strategy for DISC in the S-IDS. To the best of our knowledge, this work is the first approach that analyzes the optimal DISC strategy against the various mutants of intrusion packets. From evaluation results, we show that the DISC by the defender is more effective than the SISC against various mutants of intrusion packets by the intruder.
引用
收藏
页码:15461 / 15477
页数:16
相关论文
共 50 条
  • [41] A review on dynamic substructuring methods for model updating and damage detection of large-scale structures
    Weng, Shun
    Zhu, Hongping
    Xia, Yong
    Li, Jiajing
    Tian, Wei
    ADVANCES IN STRUCTURAL ENGINEERING, 2020, 23 (03) : 584 - 600
  • [42] Adaptive Intrusion Detection in the Networking of Large-Scale LANs with Segmented Federated Learning
    Sun Y.
    Esaki H.
    Ochiai H.
    IEEE Open Journal of the Communications Society, 2021, 2 : 102 - 112
  • [43] Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems
    Paul, Sayan
    Makkar, Tushar
    Chandrasekaran, K.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 335 - 348
  • [44] Game Theoretic Framework for Reputation-based Distributed Intrusion Detection
    Bradai, Amira
    Afifi, Hossam
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 558 - 563
  • [45] A simple model to relate ionogram signatures to large-scale wave structure
    Tsunoda, Roland T.
    Geophysical Research Letters, 2012, 39 (17)
  • [46] A simple model to relate ionogram signatures to large-scale wave structure
    Tsunoda, Roland T.
    GEOPHYSICAL RESEARCH LETTERS, 2012, 39
  • [47] A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
    Kiennert, Christophe
    Ismail, Ziad
    Debar, Herve
    Leneutre, Jean
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [48] On a Game of Large-Scale Projects Competition
    Nikonov, Oleg I.
    Medvedeva, Marina A.
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS 1 AND 2, 2009, 1168 : 982 - 986
  • [49] An information-theoretic based model for large-scale contextual text processing
    Perrin, P
    Petry, F
    INFORMATION SCIENCES, 1999, 116 (2-4) : 229 - 252