Abstract
In the area of Intrusion Detection (ID) games are being played between potential attackers and the Intrusion Detection Systems (IDSs) that protect the target systems of several attacks. More than a few game models presented in the past have showed how much beneficial Game Theory could be when incorporating with ID. In this research work an ID game model is constructed and examined as a signaling game. First, we construct the ID signaling game in an extensive form by defining the corresponding payoffs. Next, we represent it in a payoff matrix as a normal form game. We examine then the solution of the game by removing the dominated strategies. Finally, we compute all the equilibria of the ID signaling game in pure and behavioral strategies. The results give valuable explanations about how ID games are being played, what are players’ choices and under which circumstances, and the amount of uncertainty an ID game bears from its start point until the end.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Binmore, K.: Playing for Real - A Text on Game Theory. Oxford University Press (2007)
McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, Version 0.2007.01.30 (January 2007), http://www.gambit-project.org (accessed December 20, 2012)
Gintis, H.: Game Theory Evolving - A Problem-Centered Introduction to Modeling Strategic Interaction. Princeton University Press (2000)
Lin, J., Liu, P., Jing, J.: Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012)
Osborn, M.J., Rubinstein, A.: A Course in Game Theory. The MIT Press (1994)
Patcha, A., Park, J.-M.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security (June 2004)
Patcha, A., Park, J.-M.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security 2(2), 131–137 (2006)
Shen, S., Li, Y., Xu, H., Cao, Q.: Signaling game based strategy of intrusion detection in wireless sensor networks. Computers and Mathematics with Applications (62), 2404–2416 (2011)
Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press (1953)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kantzavelou, I., Katsikas, S.K. (2014). Uncertainty in Intrusion Detection Signaling Games. In: Katsikas, S., Agudo, I. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2013. Lecture Notes in Computer Science, vol 8341. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53997-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-53997-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53996-1
Online ISBN: 978-3-642-53997-8
eBook Packages: Computer ScienceComputer Science (R0)