Skip to main content

An Encryption Traffic Analysis Countermeasure Model Based on Game Theory

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11063))

Included in the following conference series:

  • 1694 Accesses

Abstract

With the development of network technologies, the proportion of encrypted traffic in cyberspace is increasing. This phenomenon directly leads to the increasingly challenging management and control of network traffic. The research on encrypted traffic analysis and monitoring at this stage has become an important direction. Based on game theory, this paper proposes a countermeasure model in the detection of encrypted traffic and expounds the key elements of the model. Finally, we will present a detailed analysis of the pay and benefits between the two sides of the game.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Myerson, R.B.: Game Theory: Analysis of Conflict. Harvard University Press, p. 1. Chapter-preview links, pp. vii–xi (1991)

    Google Scholar 

  2. Bellhouse, D.: The Problem of Waldegrave. Journal Électronique d’Histoire des Probabilités et de la Statistique 3(2), 1–12 (2007)

    MathSciNet  MATH  Google Scholar 

  3. Madison, J.: Vices of the Political System of the United States, April 1787

    Google Scholar 

  4. Screpanti, E., Zamagni, S.: An Outline of the History of Economic Thought, 2nd edn. Oxford University Press, Oxford (2005)

    Book  Google Scholar 

  5. Kim, S.: Game theory applications in network design, p. 3. IGI Global, Hershey (2014)

    Book  Google Scholar 

  6. Mirowski, P.: What were von neumann and morgenstern trying to accomplish? In: Weintraub, E.R. (ed.) Toward a History of Game Theory, pp. 113–147. Duke University Press, Durham (1992). ISBN 0-8223-1253-0

    Google Scholar 

  7. Leonard, R.: Von Neumann, Morgenstern, and the Creation of Game Theory. Cambridge University Press, New York (2010). ISBN 9780521562669

    Book  Google Scholar 

  8. Owen, G.: Game Theory: Third Edition. Emerald Group Publishing, Owen, Guillermo, p. 11 (1995). ISBN 0-12-531151-6

    Google Scholar 

  9. Roy, S., Ellis, C., et al.: A survey of game theory as applied to network security. In: IEEE. Proceedings of the 43rd Hawaii International Conference on System Sciences, pp. 1–10 (2010)

    Google Scholar 

  10. Manshaei, M.H., Zhu, Q., Alpcan, T., et al.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2013)

    Article  Google Scholar 

  11. Alazzawe, A., Nawaz, A., Bayaraktar, M.M.: Game theory and intrusion detection systems (2006). http://theory.stanford.edu/Ëœiliano/courses/06S-GMUISA767/project/papers/alazzawe-mehmet-nawaz.pdf

  12. Alpcan, T., Baser, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proceedings of the 43rd IEEE Conference on Decision and Control (2004)

    Google Scholar 

  13. Alpcan, T., Baser, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications (2006)

    Google Scholar 

  14. Bloem, M., Alpcan, T., Basar, T.: Intrusion response as a resource allocation problem. In: IEEE Conference on Decision and Control (2006)

    Google Scholar 

  15. Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 212–227. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76929-3_20

    Chapter  Google Scholar 

  16. Bush, G.W.: National strategy to secure cyberspace, office of the president (2003)

    Google Scholar 

  17. Carin, L., Cybenko, G., Hughes, J.: Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer (2008)

    Google Scholar 

  18. Chen, Z.: Modeling and defending against internet worm attacks. Ph. D. Dissertation at Georgia Institute of Technology (2007)

    Google Scholar 

  19. President’s Information Technology Advisory Committee, Cyber Security: A crisis of prioritization (2005)

    Google Scholar 

  20. White, A.: Practical Analysis of Encrypted Network Traffic. Dissertations & Theses – Gradworks (2015)

    Google Scholar 

  21. Anderson, B., McGrew, D.: Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2017)

    Google Scholar 

  22. CISCO. Encrypted Traffic Analytics [R/OL] (2017)

    Google Scholar 

  23. Lotfollahi, M., Zade, R.S.H., et al.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning [J/OL] (2017)

    Google Scholar 

  24. Anderson, B., McGrew, D.: Identifying encrypted malware traffic with contextual flow data. In: ACM. Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 35–46 (2016)

    Google Scholar 

  25. Deng, Z., Liu, Z.: The random forest based detection of shadowsock’s traffic. In: 2017 IEEE 9th International Conference on Intelligent Human-Machine Systems and Cybernetics, pp. 75–78 (2017)

    Google Scholar 

  26. Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(01), 1–41 (2005)

    Article  Google Scholar 

  27. Xu, J., Lee, W.: Sustaining availability of web services under distributed denial of service attack. IEEE Trans. Comput. 52(04), 195–208 (2003)

    Google Scholar 

  28. Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  29. Slantchev, B.L.: Game Theory: Dominance, Nash Equilibrium, Symmetry. Department of Political Science, University of California, San Diego (2008)

    Google Scholar 

Download references

Acknowledgment

This paper is supported by the National Natural Science Foundation of China under Grant No. 61572153 and the National Key research and Development Plan (Grant No. 2018YFB0803504).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, X., Lu, H., Cui, X., Wang, L. (2018). An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11063. Springer, Cham. https://doi.org/10.1007/978-3-030-00006-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00006-6_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00005-9

  • Online ISBN: 978-3-030-00006-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics