A game-based intrusion detection mechanism to confront internal attackers

被引:23
作者
Kantzavelou, Ioanna [1 ,2 ]
Katsikas, Sokratis [3 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Karlovassi, Samos, Greece
[2] Technol Educ Inst Athens, Dept Informat, Aegaleo 12210, Attica, Greece
[3] Univ Piraeus, Dept Digital Syst, GR-18532 Piraeus, Greece
关键词
Intrusion detection; Internal attacker; Non-cooperative game theory; Repeated game; Quantal response equilibrium; Detection mechanism;
D O I
10.1016/j.cose.2010.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insiders might threaten organizations' systems any time. By interacting with a system, an insider plays games with the security mechanisms employed to protect it. We apply game theory to model these interactions in an extensive form game that is being played repeatedly with an Intrusion Detection System (IDS). The outcomes of the game are quantified by first specifying players' preferences, and then, by using the von Neumann-Morgenstern utility function, to assign numbers that reflect these preferences. Examining players' best responses, the solution of the game follows by locating all the Nash Equilibria (NE). We extend the NE notion to the logit Quantal Response Equilibrium (QRE), to capture players' bounded rationality and model insider's behavior. The QRE results are more realistic, and show that the solution of the game might be significantly different than the corresponding NE solution. Thus, we determine how an insider will interact in the future, and how an IDS will react to protect the system. To easily exploit QRE results in ID, we propose the use of a detection mechanism. To present a possible implementation scheme of the detection mechanism, we give the application model and a detailed game-based detection algorithm. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General Security and protection. D.4.6 [Operating Systems]: Security and Protection. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:859 / 874
页数:16
相关论文
共 41 条
[1]  
Agah A., 2007, INT J NETWORK SECURI, V5, P145
[2]   A game theoretic analysis of intrusion detection in access control systems [J].
Alpcan, T ;
Basar, T .
2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, :1568-1573
[3]  
Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
[4]  
[Anonymous], 2006, P 12 INT S DYN GAM A
[5]  
[Anonymous], 2005, CMUSEI2004TR021
[6]  
Binmore K., 2007, Playing for Real-A text on game theory
[7]  
Brackney Richard C., P MARCH 2004 WORKSH P MARCH 2004 WORKSH
[8]  
Cappelli D.M., 2009, COMMON SENSE GUIDE P
[9]  
CAVUSOGLU H, 2003, P 24 INT C INF SYST, P692
[10]   Combining probability distributions from experts in risk analysis [J].
Clemen, RT ;
Winkler, RL .
RISK ANALYSIS, 1999, 19 (02) :187-203