Computer Science – Computer Science and Game Theory
Scientific paper
2011-10-09
Computer Science
Computer Science and Game Theory
Scientific paper
Intrusion Detection Systems (IDSs) are becoming essential to protecting modern information infrastructures. The effectiveness of an IDS is directly related to the computational resources at its disposal. However, it is difficult to guarantee especially with an increasing demand of network capacity and rapid proliferation of attacks. On the other hand, modern intrusions often come as sequences of attacks to reach some predefined goals. It is therefore critical to identify the best default IDS configuration to attain the highest possible overall protection within a given resource budget. This paper proposes a game theory based solution to the problem of optimal signature-based IDS configuration under resource constraints. We apply the concepts of indices of power, namely, Shapley value and Banzhaf-Coleman index, from cooperative game theory to quantify the influence or contribution of libraries in an IDS with respect to given attack graphs. Such valuations take into consideration the knowledge on common attack graphs and experienced system attacks and are used to configure an IDS optimally at its default state by solving a knapsack optimization problem.
Basar Tamer
Zhu Quanyan
No associations
LandOfFree
Indices of Power in Optimal IDS Default Configuration: Theory and Examples does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Indices of Power in Optimal IDS Default Configuration: Theory and Examples, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Indices of Power in Optimal IDS Default Configuration: Theory and Examples will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-88397