All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Game Theoretical Adaptation Model for Intrusion Detection System

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F12%3A00194263" target="_blank" >RIV/68407700:21230/12:00194263 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1007/978-3-642-28786-2" target="_blank" >http://dx.doi.org/10.1007/978-3-642-28786-2</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-642-28786-2" target="_blank" >10.1007/978-3-642-28786-2</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Game Theoretical Adaptation Model for Intrusion Detection System

  • Original language description

    We present a self-adaptation mechanism for Network Intrusion Detection System which uses a game-theoretical mechanism to increase system robustness against targeted attacks on IDS adaptation. We model the adaptation process as a strategy selection in sequence of single stage, two player games. The key innovation of our approach is a secure runtime game definition and numerical solution and real-time use of game solutions for dynamic system reconfiguration. Our approach is suited for realistic environments where we typically lack any ground truth information regarding traffic legitimacy/maliciousness and where the significant portion of system inputs may be shaped by the attacker in order to render the system ineffective. Therefore, we rely on the concept of challenge insertion: we inject a small sample of simulated attacks into the unknown traffic and use the system response to these attacks to define the game structure and utility functions. This approach is also advantageous from the

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2012

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Advances on Practical Applications of Agents and Multi-Agent Systems

  • ISBN

    978-3-642-28785-5

  • ISSN

    1867-5662

  • e-ISSN

  • Number of pages

    10

  • Pages from-to

    201-210

  • Publisher name

    Springer

  • Place of publication

    Berlin

  • Event location

    Salamanca

  • Event date

    Mar 28, 2012

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000310544200022