A fictitious play-based response strategy for multistage intrusion defense systems
نویسندگان
چکیده
منابع مشابه
A Response Strategy Model for Intrusion Response Systems
There are several types of security systems, which focus on detecting, mitigating and responding to incidents. Current response systems are largely based on manual incident response selection strategies, which can introduce delays between detection and response time. However, it would be beneficial if critical and urgent incidents are addressed as soon as possible before they jeopardised critic...
متن کاملA Verification Framework for Fictitious Play Based Learning Algorithms
Distributed optimisation techniques have gained increasing attention due to fast development of autonomous robots. Many algorithms have been proposed to make optimisation more efficient. In this paper we propose a framework, which is based on probabilistic verification techniques, in order to compare the performance of various game-theoretic algorithms, in particular, fictitious play and its va...
متن کاملA response selection model for intrusion response systems: Response Strategy Model (RSM)
Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response options automatically in order to act fast to respond to only true and critical incidents as well as minimise their impact. In addition, incidents also can be prioritised into different...
متن کاملGeneralised weakened fictitious play
A general class of adaptive process in games is developed, which significantly generalises weakened fictitious play (Van der Genugten, 2000) and includes several interesting fictitious-play-like processes as special cases. The general model is rigorously analysed using the best response differential inclusion, and shown to converge in games with the fictitious play property. Furthermore, a new ...
متن کاملBrown's original fictitious play
What modern game theorists describe as “fictitious play” is not the learning process George W. Brown defined in his 1951 paper. His original version differs in a subtle detail, namely the order of belief updating. In this note we revive Brown’s original fictitious play process and demonstrate that this seemingly innocent detail allows for an extremely simple and intuitive proof of convergence i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2013
ISSN: 1939-0114
DOI: 10.1002/sec.730