JOURNAL ARTICLE

A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection

Yu LiuHong ManCristina Comaniciu

Year: 2006 Journal:   2006 IEEE International Conference on Communications Vol: 43 Pages: 2201-2206

Abstract

As information technology evolves, and as more intrusion detection (ID) techniques are developed, security architects face the problem of effectively integrating various detection techniques to improve overall detection performance while maintain a high level of efficiency in network operation. In this paper, we consider the problem of optimal intrusion detection strategy in a network environment where multiple ID techniques are deployed. We first formulate a zero-sum attacker/defender game. The objective of the defender is to decide an optimal mixed strategy (i.e., a distribution over a set of strategies with each corresponding to the use of a particular ID technique) that maximizes his expected detection gain. In contrast, the objective of the attacker is to decide an optimal mixed strategy (i.e., a distribution over a set of strategies with each corresponding to a specific attack type or anomaly pattern) that minimizes his expected detection loss. The minmax theorem guarantees an optimal equilibrium strategy pair, which provides a valuable quantitative measure of the contributions from different ID techniques to the overall detection efficiency. Such information can assist security architects in understanding the effectiveness of these techniques, and in selecting the appropriate intrusion detection techniques according to the expected attacks. We also formulate a non-zero-sum noncooperative attacker/defender game where the payoffs of players are non-strictly competitive. We show that this game achieves at least one Nash equilibrium that leads to a defense strategy for the defender. Examples are presented and discussed both analytically and numerically.

Keywords:
Minimax Intrusion detection system Computer science Strategy Nash equilibrium Game theory Set (abstract data type) Mathematical optimization Contrast (vision) Zero-sum game Network security Measure (data warehouse) Artificial intelligence Data mining Computer security Mathematics Mathematical economics

Metrics

24
Cited By
1.88
FWCI (Field Weighted Citation Impact)
24
Refs
0.87
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

A game theoretic approach to cooperative intrusion detection

Yunchuan GuoHan ZhangLingcui ZhangLiang FangFenghua Li

Journal:   Journal of Computational Science Year: 2018 Vol: 30 Pages: 118-126
BOOK-CHAPTER

A Game Theoretic Approach for Deploying Intrusion Detection Agent

Yiming ChenDachrahn WuCheng‐Kuang Wu

Lecture notes in computer science Year: 2009 Pages: 446-451
BOOK-CHAPTER

A Game-Theoretic Approach for Designing Mixed Mutation Strategies

Jun HeXin Yao

Lecture notes in computer science Year: 2005 Pages: 279-288
© 2026 ScienceGate Book Chapters — All rights reserved.