Title :
A game theoretic approach to control IDS sensitivity
Author :
Mozafari, Niloofar ; Khodayari, Mohsen ; Farhadi, Mohammad-Kazem ; Hamzeh, Ali
Author_Institution :
Sch. of Electr. & Comput. Eng., Shiraz Univ., Shiraz, Iran
Abstract :
Nowadays, computer networks especially the Internet as a prime example, become a separable part of our social lives. The security is the most important concepts that must be considered in computer networks. Intrusion Detection System (IDS) is a security tool that enhances the information security paradigm beyond traditional reactive and protective network security. It monitors and analyses the received packets in network systems and signs the security problems. Controlling the degree of security is one of the most challenges with IDS. An excessive increase in the IDS sensitivity may cause increasing the system costs and difficulties in accessing to the system. On the other hand, an excessive reduction in the IDS sensitivity may cause damages to system duo to not detecting most of the attacks. Making balance between these tradeoffs is a problem that the system administrator is unable to handle. In this paper, we propose a game theoretic approach to address the IDS sensitivity degree in the system. Our approach in comparison to the previous methods which model the behavior of the attacker and IDS, models the system and attacker as two-players, noncooperative game. We conduct our model on the famous data set in security area and obtained result is promising.
Keywords :
computer network security; game theory; IDS behavior; IDS sensitivity control; IDS sensitivity degree; IDS sensitivity reduction; Internet; attacker behavior; attacker modelling; computer networks; game theoretic approach; information security paradigm enhancement; intrusion detection system; received packet analysis; received packet monitoring; security tool; social lives; system administrator; system costs; system modelling; two-player-noncooperative game; Ad hoc networks; Educational institutions; Games; Intrusion detection; Nash equilibrium; Sensitivity; Nash Equilibrium; attacker cost; intrusion detection system; sensor cost;
Conference_Titel :
Information and Knowledge Technology (IKT), 2013 5th Conference on
Conference_Location :
Shiraz
Print_ISBN :
978-1-4673-6489-8
DOI :
10.1109/IKT.2013.6620042