Network packets sampling modeling based on static non-cooperative game

被引:0
|
作者
Lin H. [1 ]
Chen H. [2 ]
Tao J. [1 ,2 ]
机构
[1] School of Business, Nanjing University
[2] School of Computer Science and Engineering, Southeast University
来源
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) | 2010年 / 40卷 / 03期
关键词
Game theory; Nash equilibrium; Network intrusion; Packet sampling;
D O I
10.3969/j.issn.1001-0505.2010.03.009
中图分类号
学科分类号
摘要
In order to improve the performance of network intrusion detection systems, game theory is introduced to model intrusion packet sampling for network security. Based on the analysis approach of static non-cooperative game theory, the closed solution of the mixed strategy Nash equilibrium is derived by means such that both network defender and attacker adjusted their strategies to maximize their utility. A dynamic packets sampling algorithm (DDPSA) and a centralized increment packets sampling algorithm (CIPSA) are designed according to the mixed strategy. By the three intrusion packets sampling on equal-probability, randomness and game-theory attacking modes, the effectiveness of the both two algorithms are inspected. The results of simulation indicate that the CIPSA has more effective utilities than the DDSPA. Moreover, the CIPSA has the same packets sampling effectiveness under the three attacking modes, which indicate the stability of the CIPSA and the rationality of a mixed strategy in this network intrusion packet sampling model.
引用
收藏
页码:481 / 485
页数:4
相关论文
共 11 条
  • [1] Uribe T.E., Cheung S., Automatic analysis of firewall and network intrusion detection system configurations, Journal of Computer Security, 15, 6, pp. 663-687, (2007)
  • [2] Altman E., Boulogne T., El-Azouzi R., Et al., A survey on networking games in telecommunications, Computers and Operations Research, 33, 2, pp. 286-311, (2006)
  • [3] Alpcan T., Basar T., A game theoretic approach to decision and analysis in network intrusion detection, Proceedings of the 42nd IEEE Conference on Decision and Control, pp. 2595-2600, (2003)
  • [4] Liu Y., Comaniciu C., Man H., Modeling misbehavior in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, 1, 3-4, pp. 243-254, (2006)
  • [5] Otrok H., Mehrandish M., Assi C., Et al., Game theoretic models for detecting network intrusions, Computer Communications, 31, 10, pp. 1934-1944, (2008)
  • [6] Alpcan T., Basar T., A game theoretic analysis of intrusion detection in access control systems, Proceedings of the 43rd IEEE Conference on Decision and Control, pp. 1568-1573, (2004)
  • [7] Kodialam M., Lakshman T.V., Detecting network intrusions via sampling: a game theoretic approach, IEEE INFOCOM, pp. 1880-1889, (2003)
  • [8] Felegyhazi M., Cagalj M., Bidokhti S.S., Et al., Non-cooperative multi-radio channel allocation in wireless networks, IEEE INFOCOM, pp. 1442-1450, (2007)
  • [9] Felegyhazi M., Hubaux J.-P., Buttyan L., Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Transactions on Mobile Computing, 5, 5, pp. 463-476, (2006)
  • [10] Tao J., Lin H., Application and research on non-cooperative flow and congestion control game, Journal of Southeast University: Natural Science Edition, 36, 1, pp. 52-57, (2006)