Skip to main content

A Game Theoretic Approach for Deploying Intrusion Detection Agent

  • Conference paper
Agent Computing and Multi-Agent Systems (PRIMA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5044))

Included in the following conference series:

  • 737 Accesses

Abstract

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value to compute the Shapley value of intrusion detection agent under the various threat levels. Therefore, the fair agent allocation creates a minimum set of IDS deployment costs. Numerical examples show that the network administrator can quantitatively evaluate the security risk of each intrusion detection agent and easily select the most effective IDS agent deployment to meet the various threat levels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: IEEE Conference on Decision and Control, pp. 2595–2600 (2003)

    Google Scholar 

  2. Dixit, A., Skeath, S.: Games of Strategy. W. W. Norton & Company (2001)

    Google Scholar 

  3. Keromytis, A.D., Vishal, M., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE Communications 22, 176–188 (2004)

    Google Scholar 

  4. McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory (2007), http://econweb.tamu.edu/gambit

  5. Mishra, D., Rangarajan, B.: Cost Sharing in a Job Scheduling Problem Using the Shapley Value. In: Proceedings of the 6th ACM conference on Electronic commerce, pp. 232–239 (2005)

    Google Scholar 

  6. Owen, G.: Game Theory, 3rd edn. Academic Press, New York (2001)

    MATH  Google Scholar 

  7. Parsons, S., Wooldridge, M.: Game Theory and Decision Theory in Multi-Agent Systems. Autonomous Agents and Multi-Agent Systems 5, 243–254 (2002)

    Article  MATH  Google Scholar 

  8. Schechter, S.E.: Computer Security Strength and Risk: a Quantitative Approach. PhD Thesis, Harvard Univ. (2004)

    Google Scholar 

  9. Zolezzi, J.M., Rudnick, H.: Transmission Cost Allocation by Cooperative Games and Coalition Formation. IEEE Transactions on power systems 41, 1008–1015 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, YM., Wu, D., Wu, CK. (2009). A Game Theoretic Approach for Deploying Intrusion Detection Agent. In: Ghose, A., Governatori, G., Sadananda, R. (eds) Agent Computing and Multi-Agent Systems. PRIMA 2007. Lecture Notes in Computer Science(), vol 5044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01639-4_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01639-4_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01638-7

  • Online ISBN: 978-3-642-01639-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics