Game theoretic approach towards intrusion detection

Manjula C. Belavagi, Balachandra Muniyal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Inventive Computation Technologies, ICICT 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume1
ISBN (Electronic)9781509012855
DOIs
Publication statusPublished - 18-01-2017
Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
Duration: 26-08-201627-08-2016

Conference

Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
CountryIndia
CityCoimbatore
Period26-08-1627-08-16

Fingerprint

Intrusion detection
Datasets

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Computer Science Applications
  • Health Informatics

Cite this

Belavagi, M. C., & Muniyal, B. (2017). Game theoretic approach towards intrusion detection. In Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 (Vol. 1). [7823193] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/INVENTIVE.2016.7823193
Belavagi, Manjula C. ; Muniyal, Balachandra. / Game theoretic approach towards intrusion detection. Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 1 Institute of Electrical and Electronics Engineers Inc., 2017.
@inproceedings{2e1e75af628c45ebb14465aa8cdac27f,
title = "Game theoretic approach towards intrusion detection",
abstract = "Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.",
author = "Belavagi, {Manjula C.} and Balachandra Muniyal",
year = "2017",
month = "1",
day = "18",
doi = "10.1109/INVENTIVE.2016.7823193",
language = "English",
volume = "1",
booktitle = "Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Belavagi, MC & Muniyal, B 2017, Game theoretic approach towards intrusion detection. in Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. vol. 1, 7823193, Institute of Electrical and Electronics Engineers Inc., 2016 International Conference on Inventive Computation Technologies, ICICT 2016, Coimbatore, India, 26-08-16. https://doi.org/10.1109/INVENTIVE.2016.7823193

Game theoretic approach towards intrusion detection. / Belavagi, Manjula C.; Muniyal, Balachandra.

Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 1 Institute of Electrical and Electronics Engineers Inc., 2017. 7823193.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Game theoretic approach towards intrusion detection

AU - Belavagi, Manjula C.

AU - Muniyal, Balachandra

PY - 2017/1/18

Y1 - 2017/1/18

N2 - Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.

AB - Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection system, which observes the data traffic and identifies it as an intrusion or not. The objective of this paper is to design a model using game theoretic approach for intrusion detection. Game model is designed by defining players, strategies and utility functions to identify the Probe attacks. This model is tested with NSLKDD data set. The model is the Probe attacks are identified by dominated strategies elimination method. Experimental results shows that game model identifies the attacks with good detection rate.

UR - http://www.scopus.com/inward/record.url?scp=85011079677&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011079677&partnerID=8YFLogxK

U2 - 10.1109/INVENTIVE.2016.7823193

DO - 10.1109/INVENTIVE.2016.7823193

M3 - Conference contribution

AN - SCOPUS:85011079677

VL - 1

BT - Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Belavagi MC, Muniyal B. Game theoretic approach towards intrusion detection. In Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Vol. 1. Institute of Electrical and Electronics Engineers Inc. 2017. 7823193 https://doi.org/10.1109/INVENTIVE.2016.7823193