Abstract
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value to compute the Shapley value of intrusion detection agent under the various threat levels. Therefore, the fair agent allocation creates a minimum set of IDS deployment costs. Numerical examples show that the network administrator can quantitatively evaluate the security risk of each intrusion detection agent and easily select the most effective IDS agent deployment to meet the various threat levels.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: IEEE Conference on Decision and Control, pp. 2595–2600 (2003)
Dixit, A., Skeath, S.: Games of Strategy. W. W. Norton & Company (2001)
Keromytis, A.D., Vishal, M., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE Communications 22, 176–188 (2004)
McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory (2007), http://econweb.tamu.edu/gambit
Mishra, D., Rangarajan, B.: Cost Sharing in a Job Scheduling Problem Using the Shapley Value. In: Proceedings of the 6th ACM conference on Electronic commerce, pp. 232–239 (2005)
Owen, G.: Game Theory, 3rd edn. Academic Press, New York (2001)
Parsons, S., Wooldridge, M.: Game Theory and Decision Theory in Multi-Agent Systems. Autonomous Agents and Multi-Agent Systems 5, 243–254 (2002)
Schechter, S.E.: Computer Security Strength and Risk: a Quantitative Approach. PhD Thesis, Harvard Univ. (2004)
Zolezzi, J.M., Rudnick, H.: Transmission Cost Allocation by Cooperative Games and Coalition Formation. IEEE Transactions on power systems 41, 1008–1015 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, YM., Wu, D., Wu, CK. (2009). A Game Theoretic Approach for Deploying Intrusion Detection Agent. In: Ghose, A., Governatori, G., Sadananda, R. (eds) Agent Computing and Multi-Agent Systems. PRIMA 2007. Lecture Notes in Computer Science(), vol 5044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01639-4_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-01639-4_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01638-7
Online ISBN: 978-3-642-01639-4
eBook Packages: Computer ScienceComputer Science (R0)