Game Theoretical Model for Adaptive Intrusion Detection System
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F14%3A00223980" target="_blank" >RIV/68407700:21230/14:00223980 - isvavai.cz</a>
Alternative codes found
RIV/28943601:_____/14:#0000006
Result on the web
<a href="http://link.springer.com/chapter/10.1007/978-3-662-44750-5_7" target="_blank" >http://link.springer.com/chapter/10.1007/978-3-662-44750-5_7</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-662-44750-5_7" target="_blank" >10.1007/978-3-662-44750-5_7</a>
Alternative languages
Result language
angličtina
Original language name
Game Theoretical Model for Adaptive Intrusion Detection System
Original language description
We present a self-adaptation mechanism for network intrusion detection system based on the use of game-theoretical formalism. The key innovation of our method is a secure runtime definition and solution of the game and real-time use of game solutions forimmediate system reconfiguration. Our approach is suited for realistic environments where we typically lack any ground truth information regarding traffic legitimacy/maliciousness and where the significant portion of system inputs may be shaped by the attacker in order to render the system ineffective. Therefore, we rely on the concept of challenge insertion: we inject a small sample of simulated attacks into the unknown traffic and use the system response to these attacks to define the game structureand utility functions. This approach is also advantageous from the security perspective, as the manipulation of the adaptive process by the attacker is far more difficult.
Czech name
—
Czech description
—
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/VG20122014086" target="_blank" >VG20122014086: Applied research of a metod of an efficient management of network security of data centers, servers and cloud services verified by practical measurements</a><br>
Continuities
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Others
Publication year
2014
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Transactions on Computational Collective Intelligence
ISSN
0302-9743
e-ISSN
—
Volume of the periodical
15
Issue of the periodical within the volume
—
Country of publishing house
DE - GERMANY
Number of pages
31
Pages from-to
133-163
UT code for WoS article
—
EID of the result in the Scopus database
—