• Corpus ID: 30837168

Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model

  title={Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model},
  author={Amin Nezarat},
  journal={Int. J. Netw. Secur.},
  • A. Nezarat
  • Published 2018
  • Computer Science
  • Int. J. Netw. Secur.
Intrusion Detection Systems (IDS) are systems to protect the network resources against the attacks. Considering the extent of the attacks in the internet environment and the change in the form and type of the attacks from the centralized to the distributed strategy, such systems also tend to move towards the distributed architecture. In this paper, a mobile agent based method working as suspicious movements detection sensors has been proposed. The attack detecting White Globule Agents (WGA… 

Figures and Tables from this paper

INSecS: An Intelligent Network Security System

The proposed Intrusion Detection System is a novel, distributed IDS that is able to perform in real-time in a distributed system that detects multi-step attacks faster by updating the system rules when a reconnaissance attack is detected, without any human intervention.

Network Topology Masking in Distributed Information Systems

This work developed a masker, efficient software for obfuscation the network topology in distributed information systems, and determined a method for selecting the best-masked topology based on the estimation of efficiency indexes.

Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet

Experimental results show that the proposed traffic characteristic map-based intrusion detection model has a good performance of intrusion detection in the industrial field network and the robustness and discrimination of the traffic characteristics map perceptual hash algorithm (TCM-PH) were proved.

A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm

Experimental results indicate that this proposed multi-threading solution specifically for multimedia packets in NIDS can help NIDS to improve its differentiation and selection ability for dangerous multimedia packets effectively.



A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems

The experimental results show that with the proposed two-stage game theoretic model, the network administrator can quantitatively evaluate the security risk of eachIDS agent and easily select the most critical and effective IDS agent deployment to meet the various threat levels to the network.

A game theoretic approach to decision and analysis in network intrusion detection

  • T. AlpcanT. Başar
  • Computer Science
    42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475)
  • 2003
We investigate the basic trade-offs, analysis and decision processes involved in information security and intrusion detection, as well as possible application of game theoretic concepts to develop a

Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision

A significant improvement in detection accuracy, a reduction in training and testing time using the reduced feature set, and the fact that differential evolution (DE) is not limited to optimization of continuous problems but work well for discrete optimization are buttressed.

Collaborative IDS Framework for Cloud

A novel Collaborative IDS (CIDS) Framework for cloud is proposed and Snort is used to detect the known stealthy attacks using signature matching and Alert Correlation and automatic signature generation reduce the impact of Denial of Service (DoS)/Distributed DoS (DDoS) attacks and increase the performance and accuracy of IDS.

A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment

A group of mobile agents act as the sensors of invalid actions in the cloud environment and calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin.

Mobile Agents in Intrusion Detection System: Review and Analysis

The evolution of IDS is analyzed and how mobile agents such as SNORT could increase the integrity of traditional systems without human intervention is analyzed.

The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set

An integrated artificial immune intrusion detection model based on decision-theoretic rough set attributes reduction algorithm and real time dendritic cell algorithm analyzed the environment and antigen information obtained and the dynamic increases of rule set was achieved.

A double oracle algorithm for zero-sum security games on graphs

Rugged (Randomization in Urban Graphs by Generating strategies for Enemy and Defender), the first scalable optimal solution technique for network security games, is presented, based on a double oracle approach.

Incentive-based modeling and inference of attacker intent, objectives, and strategies

A game theoretic AIOS formalization is developed which can capture the inherent inter-dependency between AIOS and defender objectives and strategies in such a way that AIOS can be automatically inferred.

A Game Theoretic Method for Resource Allocation in Scientific Cloud

A method has been proposed based on auction theory that it has used a non-cooperative game theory mechanism in an incomplete information environment to select best bidder for selling resource to it and simulated results showed that the authors' suggested model converge to the best response at Nash equilibrium point.