Skip to main content

A Generic Intrusion Detection Game Model in IT Security

  • Conference paper
Book cover Trust, Privacy and Security in Digital Business (TrustBus 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5185))

Abstract

Intrusion Detection has a central role in every organization’s IT Security. However, limitations and problems prevent the commercial spread of Intrusion Detection Systems. This paper presents an attempt to improve Intrusion Detection benefits with the use of Game Theory. A generic intrusion detection game model that reveals the way an IDS interacts with a user is described and examined thoroughly. Moreover, a specific scenario with an internal attacker and an IDS is presented in a normal form game to validate the functioning of the proposed model. Solutions for this game are given as a one shot game as well as an infinitely repeated game.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, P.: Is Computer Science Science? Communication of the ACM 48(4), 27–31 (2005)

    Article  MathSciNet  Google Scholar 

  2. Skyrms, B., Vanderschraaf, P.: Game theory. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, pp. 391–439. Kluwer Academic Publishers, Dordrecht (1998)

    Google Scholar 

  3. Ho, Y., Zhao, Q., Pepyne, D.: The No Free Lunch Theorems: Complexity and Security. IEEE Transactions on Automatic Control 48(5), 783–793 (2003)

    Article  MathSciNet  Google Scholar 

  4. Cavusoglu, H., Raghunathan, S.: Configuration of Intrusion Detection System: A Comparison of Decision and Game Theoretic Approaches. In: Proc. of the 24th International Conference on Information Systems, pp. 692–705 (December 2003)

    Google Scholar 

  5. Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: Proc. of the 42rd IEEE Conference on Decision and Control (CDC), Maki, HI, pp. 2595–2600 (December 2003)

    Google Scholar 

  6. Alpcan, T., Basar, T.: A Game Theoretic Analysis of Intrusion Detection in Access Control Systems. In: Proc. of the 43rd IEEE Conference on Decision and Control (CDC), Paradise Island, Bahamas, pp. 1568–1573 (December 2004)

    Google Scholar 

  7. Lye, K., Wing, J.: Game Strategies in Network Security. In: Proc. of the Foundations of Computer Security Workshop, Copenhagen, Denmark (July 2003)

    Google Scholar 

  8. Kodialam, M., Lakshman, T.: Detecting Network Intrusions via Sampling: A Game Theoretic Approach. In: Proc. of the IEEE INFOCOM 2003, San Fransisco (March 2003)

    Google Scholar 

  9. Patcha, A., Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 280–284 (June 2004)

    Google Scholar 

  10. Patcha, A., Park, J.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security 2(2), 131–137 (2006)

    Google Scholar 

  11. Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security 5(2), 145–153 (2007)

    Google Scholar 

  12. Kreps, D.: Game Theory and Economic Modelling. Oxford University Press, Oxford (2003)

    Google Scholar 

  13. Dixit, A., Skeath, S.: Games of Strategy. W. W. Norton & Company, Inc. (1999)

    Google Scholar 

  14. McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, version 0.2007.01.30 (January 2007) (accessed May 20, 2008), http://gambit.sourceforge.net

  15. Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)

    Google Scholar 

  16. Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd

Download references

Author information

Authors and Affiliations

Authors

Editor information

Steven Furnell Sokratis K. Katsikas Antonio Lioy

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kantzavelou, I., Katsikas, S. (2008). A Generic Intrusion Detection Game Model in IT Security. In: Furnell, S., Katsikas, S.K., Lioy, A. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2008. Lecture Notes in Computer Science, vol 5185. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85735-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85735-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85734-1

  • Online ISBN: 978-3-540-85735-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics