Game theoretic approach towards intrusion detection

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Inventive Computation Technologies, ICICT 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume1
ISBN (Electronic)9781509012855
DOIs
Publication statusPublished - 18-01-2017
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
Country/TerritoryIndia
CityCoimbatore
Period26-08-1627-08-16

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Fingerprint

Dive into the research topics of 'Game theoretic approach towards intrusion detection'. Together they form a unique fingerprint.

Cite this