Game theoretic approach towards intrusion detection

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.

    Original languageEnglish
    Title of host publicationProceedings of the International Conference on Inventive Computation Technologies, ICICT 2016
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Volume1
    ISBN (Electronic)9781509012855
    DOIs
    Publication statusPublished - 18-01-2017
    Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
    Duration: 26-08-201627-08-2016

    Conference

    Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
    Country/TerritoryIndia
    CityCoimbatore
    Period26-08-1627-08-16

    All Science Journal Classification (ASJC) codes

    • Computer Vision and Pattern Recognition
    • Artificial Intelligence
    • Computer Graphics and Computer-Aided Design
    • Computer Networks and Communications
    • Computer Science Applications
    • Health Informatics

    Fingerprint

    Dive into the research topics of 'Game theoretic approach towards intrusion detection'. Together they form a unique fingerprint.

    Cite this