A Generic Intrusion Detection Game Model in IT Security

  • Ioanna Kantzavelou
  • Sokratis Katsikas
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5185)

Abstract

Intrusion Detection has a central role in every organization’s IT Security. However, limitations and problems prevent the commercial spread of Intrusion Detection Systems. This paper presents an attempt to improve Intrusion Detection benefits with the use of Game Theory. A generic intrusion detection game model that reveals the way an IDS interacts with a user is described and examined thoroughly. Moreover, a specific scenario with an internal attacker and an IDS is presented in a normal form game to validate the functioning of the proposed model. Solutions for this game are given as a one shot game as well as an infinitely repeated game.

Keywords

Intrusion Detection noncooperative Game Theory internal attacker 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Denning, P.: Is Computer Science Science? Communication of the ACM 48(4), 27–31 (2005)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Skyrms, B., Vanderschraaf, P.: Game theory. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, pp. 391–439. Kluwer Academic Publishers, Dordrecht (1998)Google Scholar
  3. 3.
    Ho, Y., Zhao, Q., Pepyne, D.: The No Free Lunch Theorems: Complexity and Security. IEEE Transactions on Automatic Control 48(5), 783–793 (2003)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Cavusoglu, H., Raghunathan, S.: Configuration of Intrusion Detection System: A Comparison of Decision and Game Theoretic Approaches. In: Proc. of the 24th International Conference on Information Systems, pp. 692–705 (December 2003)Google Scholar
  5. 5.
    Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: Proc. of the 42rd IEEE Conference on Decision and Control (CDC), Maki, HI, pp. 2595–2600 (December 2003)Google Scholar
  6. 6.
    Alpcan, T., Basar, T.: A Game Theoretic Analysis of Intrusion Detection in Access Control Systems. In: Proc. of the 43rd IEEE Conference on Decision and Control (CDC), Paradise Island, Bahamas, pp. 1568–1573 (December 2004)Google Scholar
  7. 7.
    Lye, K., Wing, J.: Game Strategies in Network Security. In: Proc. of the Foundations of Computer Security Workshop, Copenhagen, Denmark (July 2003)Google Scholar
  8. 8.
    Kodialam, M., Lakshman, T.: Detecting Network Intrusions via Sampling: A Game Theoretic Approach. In: Proc. of the IEEE INFOCOM 2003, San Fransisco (March 2003)Google Scholar
  9. 9.
    Patcha, A., Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 280–284 (June 2004)Google Scholar
  10. 10.
    Patcha, A., Park, J.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security 2(2), 131–137 (2006)Google Scholar
  11. 11.
    Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security 5(2), 145–153 (2007)Google Scholar
  12. 12.
    Kreps, D.: Game Theory and Economic Modelling. Oxford University Press, Oxford (2003)Google Scholar
  13. 13.
    Dixit, A., Skeath, S.: Games of Strategy. W. W. Norton & Company, Inc. (1999)Google Scholar
  14. 14.
    McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, version 0.2007.01.30 (January 2007) (accessed May 20, 2008), http://gambit.sourceforge.net
  15. 15.
    Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)Google Scholar
  16. 16.
    Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Ioanna Kantzavelou
    • 1
  • Sokratis Katsikas
    • 2
  1. 1.Dept. of Information and Communication Systems EngineeringUniversity of the AegeanKarlovassiGreece
  2. 2.Dept. of Technology Education and Digital SystemsUniversity of PiraeusPireausGreece

Personalised recommendations