Abstract
With the development of network technologies, the proportion of encrypted traffic in cyberspace is increasing. This phenomenon directly leads to the increasingly challenging management and control of network traffic. The research on encrypted traffic analysis and monitoring at this stage has become an important direction. Based on game theory, this paper proposes a countermeasure model in the detection of encrypted traffic and expounds the key elements of the model. Finally, we will present a detailed analysis of the pay and benefits between the two sides of the game.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Myerson, R.B.: Game Theory: Analysis of Conflict. Harvard University Press, p. 1. Chapter-preview links, pp. vii–xi (1991)
Bellhouse, D.: The Problem of Waldegrave. Journal Électronique d’Histoire des Probabilités et de la Statistique 3(2), 1–12 (2007)
Madison, J.: Vices of the Political System of the United States, April 1787
Screpanti, E., Zamagni, S.: An Outline of the History of Economic Thought, 2nd edn. Oxford University Press, Oxford (2005)
Kim, S.: Game theory applications in network design, p. 3. IGI Global, Hershey (2014)
Mirowski, P.: What were von neumann and morgenstern trying to accomplish? In: Weintraub, E.R. (ed.) Toward a History of Game Theory, pp. 113–147. Duke University Press, Durham (1992). ISBN 0-8223-1253-0
Leonard, R.: Von Neumann, Morgenstern, and the Creation of Game Theory. Cambridge University Press, New York (2010). ISBN 9780521562669
Owen, G.: Game Theory: Third Edition. Emerald Group Publishing, Owen, Guillermo, p. 11 (1995). ISBN 0-12-531151-6
Roy, S., Ellis, C., et al.: A survey of game theory as applied to network security. In: IEEE. Proceedings of the 43rd Hawaii International Conference on System Sciences, pp. 1–10 (2010)
Manshaei, M.H., Zhu, Q., Alpcan, T., et al.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2013)
Alazzawe, A., Nawaz, A., Bayaraktar, M.M.: Game theory and intrusion detection systems (2006). http://theory.stanford.edu/Ëœiliano/courses/06S-GMUISA767/project/papers/alazzawe-mehmet-nawaz.pdf
Alpcan, T., Baser, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proceedings of the 43rd IEEE Conference on Decision and Control (2004)
Alpcan, T., Baser, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications (2006)
Bloem, M., Alpcan, T., Basar, T.: Intrusion response as a resource allocation problem. In: IEEE Conference on Decision and Control (2006)
Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 212–227. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76929-3_20
Bush, G.W.: National strategy to secure cyberspace, office of the president (2003)
Carin, L., Cybenko, G., Hughes, J.: Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer (2008)
Chen, Z.: Modeling and defending against internet worm attacks. Ph. D. Dissertation at Georgia Institute of Technology (2007)
President’s Information Technology Advisory Committee, Cyber Security: A crisis of prioritization (2005)
White, A.: Practical Analysis of Encrypted Network Traffic. Dissertations & Theses – Gradworks (2015)
Anderson, B., McGrew, D.: Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2017)
CISCO. Encrypted Traffic Analytics [R/OL] (2017)
Lotfollahi, M., Zade, R.S.H., et al.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning [J/OL] (2017)
Anderson, B., McGrew, D.: Identifying encrypted malware traffic with contextual flow data. In: ACM. Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 35–46 (2016)
Deng, Z., Liu, Z.: The random forest based detection of shadowsock’s traffic. In: 2017 IEEE 9th International Conference on Intelligent Human-Machine Systems and Cybernetics, pp. 75–78 (2017)
Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(01), 1–41 (2005)
Xu, J., Lee, W.: Sustaining availability of web services under distributed denial of service attack. IEEE Trans. Comput. 52(04), 195–208 (2003)
Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)
Slantchev, B.L.: Game Theory: Dominance, Nash Equilibrium, Symmetry. Department of Political Science, University of California, San Diego (2008)
Acknowledgment
This paper is supported by the National Natural Science Foundation of China under Grant No. 61572153 and the National Key research and Development Plan (Grant No. 2018YFB0803504).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, X., Lu, H., Cui, X., Wang, L. (2018). An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11063. Springer, Cham. https://doi.org/10.1007/978-3-030-00006-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-00006-6_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00005-9
Online ISBN: 978-3-030-00006-6
eBook Packages: Computer ScienceComputer Science (R0)