Corpus ID: 30837168

Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model

@article{Nezarat2018DistributedID,
  title={Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model},
  author={A. Nezarat},
  journal={Int. J. Netw. Secur.},
  year={2018},
  volume={20},
  pages={56-64}
}
  • A. Nezarat
  • Published 2018
  • Computer Science
  • Int. J. Netw. Secur.
Intrusion Detection Systems (IDS) are systems to protect the network resources against the attacks. Considering the extent of the attacks in the internet environment and the change in the form and type of the attacks from the centralized to the distributed strategy, such systems also tend to move towards the distributed architecture. In this paper, a mobile agent based method working as suspicious movements detection sensors has been proposed. The attack detecting White Globule Agents (WGA… Expand
INSecS: An Intelligent Network Security System
TLDR
The proposed Intrusion Detection System is a novel, distributed IDS that is able to perform in real-time in a distributed system that detects multi-step attacks faster by updating the system rules when a reconnaissance attack is detected, without any human intervention. Expand
Network Topology Masking in Distributed Information Systems
In modern computer networks, it is possible for attackers to determine information about the algorithms of the distributed information systems functioning. For this purpose, methods of active andExpand
Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet
TLDR
Experimental results show that the proposed traffic characteristic map-based intrusion detection model has a good performance of intrusion detection in the industrial field network and the robustness and discrimination of the traffic characteristics map perceptual hash algorithm (TCM-PH) were proved. Expand
A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
TLDR
Experimental results indicate that this proposed multi-threading solution specifically for multimedia packets in NIDS can help NIDS to improve its differentiation and selection ability for dangerous multimedia packets effectively. Expand

References

SHOWING 1-10 OF 19 REFERENCES
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems
TLDR
The experimental results show that with the proposed two-stage game theoretic model, the network administrator can quantitatively evaluate the security risk of eachIDS agent and easily select the most critical and effective IDS agent deployment to meet the various threat levels to the network. Expand
A game theoretic approach to decision and analysis in network intrusion detection
  • T. Alpcan, T. Başar
  • Computer Science
  • 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475)
  • 2003
We investigate the basic trade-offs, analysis and decision processes involved in information security and intrusion detection, as well as possible application of game theoretic concepts to develop aExpand
Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision
TLDR
A significant improvement in detection accuracy, a reduction in training and testing time using the reduced feature set, and the fact that differential evolution (DE) is not limited to optimization of continuous problems but work well for discrete optimization are buttressed. Expand
Collaborative IDS Framework for Cloud
TLDR
A novel Collaborative IDS (CIDS) Framework for cloud is proposed and Snort is used to detect the known stealthy attacks using signature matching and Alert Correlation and automatic signature generation reduce the impact of Denial of Service (DoS)/Distributed DoS (DDoS) attacks and increase the performance and accuracy of IDS. Expand
A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment
TLDR
A group of mobile agents act as the sensors of invalid actions in the cloud environment and calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. Expand
Mobile Agents in Intrusion Detection System: Review and Analysis
TLDR
The evolution of IDS is analyzed and how mobile agents such as SNORT could increase the integrity of traditional systems without human intervention is analyzed. Expand
The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
TLDR
An integrated artificial immune intrusion detection model based on decision-theoretic rough set attributes reduction algorithm and real time dendritic cell algorithm analyzed the environment and antigen information obtained and the dynamic increases of rule set was achieved. Expand
A double oracle algorithm for zero-sum security games on graphs
TLDR
Rugged (Randomization in Urban Graphs by Generating strategies for Enemy and Defender), the first scalable optimal solution technique for network security games, is presented, based on a double oracle approach. Expand
Incentive-based modeling and inference of attacker intent, objectives, and strategies
TLDR
A game theoretic AIOS formalization is developed which can capture the inherent inter-dependency between AIOS and defender objectives and strategies in such a way that AIOS can be automatically inferred. Expand
A Game Theoretic Method for Resource Allocation in Scientific Cloud
TLDR
A method has been proposed based on auction theory that it has used a non-cooperative game theory mechanism in an incomplete information environment to select best bidder for selling resource to it and simulated results showed that the authors' suggested model converge to the best response at Nash equilibrium point. Expand
...
1
2
...