• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shi Jin, Lu Yin, and Xie Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008, 45(5): 747-757.
Citation: Shi Jin, Lu Yin, and Xie Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008, 45(5): 747-757.

Dynamic Intrusion Response Based on Game Theory

More Information
  • Published Date: May 14, 2008
  • With recent advances in network based technology and increased dependability of every day life on this technology, assuring reliable operation of network based systems is very important. During recent years, number of attacks on networks has dramatically increased and consequently interest in network intrusion detection and response has increased among the researchers. But as other network security technologies are being widely applied and achieving good results, intrusion detection and response technology is lagging. One reason is that current intrusion detection technology is limited in the detecting algorithm itself, the other is that system’s incentive and alternation of attacker’s strategies isn’t taken into consideration sufficiently in current alerts response research. A dynamic intrusion response model based on game theory (DIRBGT) is proposed to solve the second problem. On the one hand, DIRBGT takes account of incentives of system and attacker across the board, therefore the incentive of system can be assured. And on the other hand, it deals well with attack’s intent and alternation of strategies and therefore the optimal answer is stable and reliable while the optimal responses inferred from systems alone are unstable. The experimental results show that the DIRBGT model can effectively improve the accuracy and effectiveness of alert response.
  • Related Articles

    [1]He Yucheng, Ding Yaoxiang, Zhou Zhihua. Mechanism Design for Requester-Platform Strategies Under the Three-Party Crowdsourcing Market[J]. Journal of Computer Research and Development, 2022, 59(11): 2507-2519. DOI: 10.7544/issn1000-1239.20210466
    [2]Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan. A Link Prediction Approach in Temporal Networks Based on Game Theory[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964. DOI: 10.7544/issn1000-1239.2019.20180842
    [3]Wu Fan, Zheng Zhenzhe. Game Theory Based Spectrum Dynamic Management[J]. Journal of Computer Research and Development, 2016, 53(1): 38-52. DOI: 10.7544/issn1000-1239.2016.20150652
    [4]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [5]Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    [6]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [7]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [8]Liu Wanwei, Wang Ji, and Chen Huowang. A Game-Based Axiomatization of μ-Calculus[J]. Journal of Computer Research and Development, 2007, 44(11): 1896-1902.
    [9]Liu Wanwei, Wang Ji, and Chen Huowang. A Game-Based Axiomatization of μ-Calculus[J]. Journal of Computer Research and Development, 2007, 44(11): 1896-1902.
    [10]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.

Catalog

    Article views (755) PDF downloads (562) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return