Skip to main content

Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems

  • Conference paper
  • First Online:
Book cover Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

Security has always been one of the key issues of any man-made system, this paved the way for a submodule or application or a device to monitor or system for malicious activities. This system or submodule or device is known as Intrusion Detection System (IDS). As technology evolves so does the associated threats and thus the intrusion detection system needs to evolve. Game theory throws in a different perspective which have not been looked upon much. Game theory provides a way of mathematically formalizing the decision making process of policy establishment and execution. Notion of game theory can be used in intrusion detection system in assisting in defining and reconfiguring security policies given the severity of attacks dynamically. We are trying to formulate a robust model for the theoretical limits of a game theoretic approach to IDS. The most important flaw of game theory is that it assumes the adversary’s rationality and doesn’t take into consideration multiple simultaneous attacks. Therefore, a collaborative trust and Dirichlet distribution based robust game theoretic approach is proposed which will try to resolve this issue. Reinforced learning approaches using Markov Decision Process will be utilized to make it robust to multiple simultaneous attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the DOMINO overlay system. In: Proceedings of Network and Distributed System Security Symposium (NDSS04) (2004)

    Google Scholar 

  2. Zhu, Q., et al.: A game-theoretical approach to incentive design in collaborative intrusion detection networks. In: International Conference on Game Theory for Networks, 2009. GameNets’ 09. IEEE (2009)

    Google Scholar 

  3. Fung, C.J., et al.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Network Service Manage. 8.2, 79–91 (2011)

    Google Scholar 

  4. Zhu, Q., Tamer, B.: Dynamic policy-based IDS configuration. In: Proceedings of the 48th IEEE Conference on Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC 2009. IEEE (2009)

    Google Scholar 

  5. Fung, C., Baysal, O., Zhang, J., Aib, I., Boutaba, R.: Trust management for host-based collaborative intrusion detection. In: 19th IFIP/IEEE International Workshop on Distributed Systems (2008)

    Google Scholar 

  6. Fung, C., Zhang, J., Aib, I., Boutaba, R.: Robust and scalable trust management for collaborative intrusion detection. In: 11th IFIP/IEEE International Symposium on Integrated Network Management (IM09), to appear (2009)

    Google Scholar 

  7. Karel, B1., Martin, R.: Trust-based solution for robust self-configuration of distributed intrusion detection systems. In: The 20th European Conference on Artificial Intelligence, ECAI (2012)

    Google Scholar 

  8. Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 42nd IEEE Conference on Decision and Control, Dec 2003

    Google Scholar 

  9. Alpcan, T., Basar, T.: A game theoretic analysis of intrusion detection in access control systems. In: 43rd IEEE Conference on Decision and Control, 2004. CDC, vol. 2. IEEE (2004)

    Google Scholar 

  10. Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications (2006)

    Google Scholar 

  11. Nguyen, K.C., Alpcan, T., Basar, T.: Fictitious play with imperfect observations for network intrusion detection. In: Preprints of the 13th International Symposium Dynamic Games and Applications (ISDGA 2008). Wroclaw, Poland (2008)

    Google Scholar 

  12. Liu, H.M.Y., Comaniciu, C.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. Valuetools, Oct 2006

    Google Scholar 

  13. Alazzawe, A., Asad N., Bayaraktar, M.M.: Game Theory and Intrusion Detection Systems. (2006)

    Google Scholar 

  14. Lye, K., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1–2), 71–86 (2005)

    Article  Google Scholar 

  15. Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th Internationl Symposium on Dynamic Games and Applications (2006)

    Google Scholar 

  16. Wikipedia Contributors: Markov decision process. Wikipedia. The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 7 April 2015. Web.16 April 2015

    Google Scholar 

  17. Wikipedia Contributors: Reinforcement learning. Wikipedia, The Free Encyclopedia. Wikipedia. The Free Encyclopedia, 9 April 2015. Web. 16 April 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayan Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Paul, S., Makkar, T., Chandrasekaran, K. (2016). Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics