Title :
A game theory based risk and impact analysis method for Intrusion Defense Systems
Author :
Luo, Yi ; Szidarovszky, Ferenc ; Al-Nashif, Youssif ; Hariri, Salim
Author_Institution :
Dept. of Syst. & Ind. Eng., Univ. of Arizona, Tucson, AZ
Abstract :
An enormous amount of functions in our everyday life became dependent on computer networks. Network attacks become more sophisticated and perplexing. Defending against multi-stage attacks is a challenging process in intrusion defense systems (IDS) due to their complexity. This paper presents a game theory method to analyze the risk and impact of multi-stage attacks in IDS. In this method, the interactions between the attacker and the administrator are modeled as a non-cooperative zero-sum multistage game and it is modeled as a minmax game tree where the attacker is the leader and the administrator is the follower. Alternating the actions between the administrator and the attacker forms the game tree, each of them will be allowed to play a single action at any given time. In this work, a new multi-stage attacker defender (MAD) algorithm is developed to help the administrator in defending against multi-stage attacks. The believes of the attacker and the administrator are updated based on the analysis of the life-cycle for the multi-stage attacks to reduce the horizon effect.
Keywords :
communication complexity; computer networks; game theory; minimax techniques; risk analysis; security of data; telecommunication security; communication complexity; computer network; game theory based risk analysis; impact analysis method; intrusion defense system; minmax game tree; multistage attack; Algorithm design and analysis; Computer networks; Game theory; Intrusion detection; Mathematical model; Network servers; Protection; Risk analysis; Switches; Telecommunication traffic;
Conference_Titel :
Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on
Conference_Location :
Rabat
Print_ISBN :
978-1-4244-3807-5
Electronic_ISBN :
978-1-4244-3806-8
DOI :
10.1109/AICCSA.2009.5069450