Abstract
This document evaluates works related to game theory applied to IPS (Intrusion Prevention System) in networks and proposes a game theory model that allows optimize expenditure of resources in detection of intrusions in networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Michaels, S., Akkaya, K., Selcuk Uluagac, A.: Inducing data loss in Zigbee networks via join/association handshake spoofing. In: 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, pp. 401–405 (2016). https://doi.org/10.1109/cns.2016.7860527
Sforzin, A., Marmol, F.G., Conti, M., Bohli, J.M.: RPiDS: raspberry Pi IDS - a fruitful intrusion detection system for IoT. In: Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, pp. 440–448 (2017). https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoPSmartWorld.2016.0080
Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: DFA-AD: a distributed framework architecture for the detection of advanced persistent threats. Clust. Comput. 20(1), 597–609 (2017). https://doi.org/10.1007/s10586-016-0716-0
Chen, J., Chen, C.: Design of complex event-processing IDS in internet of things. In: Proceedings - 2014 6th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2014, pp. 226–229 (2014). https://doi.org/10.1109/ICMTMA.2014.57
Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game-theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embed. Comput. Syst. 16(1), 121 (2016). https://doi.org/10.1145/2886100
Manshaei, M.M.H., Zhu, Q., Alpcan, T., Bacar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. 45 (2013). https://doi.org/10.1145/2480741.2480742
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Mojica Sánchez, J.F., Salcedo Parra, O.J., Sánchez, L.C. (2018). A Game Theory Approach for Intrusion Prevention Systems. In: Figueroa-García, J., López-Santana, E., Rodriguez-Molano, J. (eds) Applied Computer Sciences in Engineering. WEA 2018. Communications in Computer and Information Science, vol 915. Springer, Cham. https://doi.org/10.1007/978-3-030-00350-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-00350-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00349-4
Online ISBN: 978-3-030-00350-0
eBook Packages: Computer ScienceComputer Science (R0)