Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model

نویسنده

  • Amin Nezarat
چکیده

Intrusion Detection Systems (IDS) are systems to protect the network resources against the attacks. Considering the extent of the attacks in the internet environment and the change in the form and type of the attacks from the centralized to the distributed strategy, such systems also tend to move towards the distributed architecture. In this paper, a mobile agent based method working as suspicious movements detection sensors has been proposed. The attack detecting White Globule Agents (WGA) scatter in the network; moving from a node to another, they build a Security Overlay Network at a time and using a kind of collaborative game and communication, and after reaching to the desired Shapley value, they can detect and report the origin and level of the attack. The proposed method in this study includes a scenario in which the WGA in a non-cooperative game against the attacker element tries to develop a negotiation to calculate the Nash equilibrium point and attain maximum utility, so that meanwhile separating the attacks from the real requests, the security level of the attack is obtained with the aid from other WGAs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

Designing of Supply Chain Coordination Mechanism with Leadership Considering (RESEARCH NOTE)

Abstract   Vertical cooperative (co-op) advertising is typically a cost sharing mechanism and coordinated effort by the channel’s members in order to increase demand and overall profits. In this marketing strategy, the manufacturer shares a fraction of the retailer’s advertising investment. This paper studies the advertising and pricing decisions in a retailer-manufacturer supply chain in which...

متن کامل

Ranking Efficient Decision Making Units Using Cooperative Game Theory Based on SBM Input-Oriented Model and Nucleolus Value

In evaluating the efficiency of decision making units (DMUs) by Data Envelopment Analysis (DEA) models, may be more than one DMU has an efficiency score equal to one. Since ranking of efficient DMUs is essential for decision makers, therefore, methods and models for this purpose are presented. One of ranking methods of efficient DMUs is cooperative game theory. In this study, Lee and Lozano mod...

متن کامل

A novel cooperative game between client and subcontractors based on technical characteristics

Large projects often have several activities which are performed by some subcontractors with several skills. Costs and time reduction and quality improvement of the project are very important for client and subcontractors. Therefore, in real large projects, subcontractors join together and form coalitions for improving the project profit. A key question is how an extra profit of cooperation amo...

متن کامل

A mathematical model of the effect of subsidy transfer in cooperative advertising using differential game theory

This work deals with subsidy transfer from a manufacturer to a retailer through the distributor in cooperative advertising. While the retailer engages in local advertising, the manufacturer indirectly participates in retail advertising using advertising subsidy which is given to the distributor, who in turn transfers it to the retailer. The manufacturer is the Stackelberg game leader; the distr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018