A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems

2004 ◽  
Vol 1 (1) ◽  
pp. 39-54 ◽  
Author(s):  
Jacob W. Ulvila ◽  
John E. Gaffney
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Zhiyong Wang ◽  
Shengwei Xu ◽  
Guoai Xu ◽  
Yongfeng Yin ◽  
Miao Zhang ◽  
...  

In this paper, the game theoretical analysis method is presented to provide optimal strategies for anomaly-based intrusion detection systems (A-IDS). A two-stage game model is established to represent the interactions between the attackers and defenders. In the first stage, the players decide to do actions or keep silence, and in the second stage, attack intensity and detection threshold are considered as two important strategic variables for the attackers and defenders, respectively. The existence, uniqueness, and explicit computation of the Nash equilibrium are analyzed and obtained by considering six different scenarios, from which the optimal detection and attack actions are provided. Numerical examples are provided to validate our theoretical results.


2015 ◽  
Vol 48 (1) ◽  
pp. 1-41 ◽  
Author(s):  
Aleksandar Milenkoski ◽  
Marco Vieira ◽  
Samuel Kounev ◽  
Alberto Avritzer ◽  
Bryan D. Payne

1999 ◽  
Vol 42 (7) ◽  
pp. 53-61 ◽  
Author(s):  
Robert Durst ◽  
Terrence Champion ◽  
Brian Witten ◽  
Eric Miller ◽  
Luigi Spagnuolo

2006 ◽  
Vol 65 (10) ◽  
pp. 929-936
Author(s):  
A. V. Agranovskiy ◽  
S. A. Repalov ◽  
R. A. Khadi ◽  
M. B. Yakubets

Sign in / Sign up

Export Citation Format

Share Document