Skip to main navigation Skip to search Skip to main content

Game theoretic framework for reputation-based distributed intrusion detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Host-Based Intrusion Detection Systems (HIDS) have been widely used to detect malicious behaviors of nodes in heterogenous networks. Collaborative intrusion detection can be more secure with a framework using reputation aggregation as an incentive. The problem of incentives and efficiency are well known problems that can be addressed in such collaborative environment. In this paper, we propose to use game theory to improve detection and optimize intrusion detection systems used in collaboration. The main contribution of this paper is that the reputation of HIDS is evaluated before modeling the game between the HIDS and attackers. Our proposal has three phases: the first phase builds reputation evaluation between HIDS and estimates the reputation for each one. In the second phase, a proposed algorithm elects a leader using reputation value to make decisions. In the last phase, using game theory the leader decides to activate or not the HIDS for optimization reasons.

Original languageEnglish
Title of host publicationProceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013
Pages558-563
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2013
Externally publishedYes
Event2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013 - Washington, DC, United States
Duration: 8 Sept 201314 Sept 2013

Publication series

NameProceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013

Conference

Conference2013 ASE/IEEE Int. Conf. on Social Computing, SocialCom 2013, the 2013 ASE/IEEE Int. Conf. on Big Data, BigData 2013, the 2013 Int. Conf. on Economic Computing, EconCom 2013, the 2013 PASSAT 2013, and the 2013 ASE/IEEE Int. Conf. on BioMedCom 2013
Country/TerritoryUnited States
CityWashington, DC
Period8/09/1314/09/13

Keywords

  • False Alarms
  • Game theory
  • Intrusion detection
  • Resource consumption

Fingerprint

Dive into the research topics of 'Game theoretic framework for reputation-based distributed intrusion detection'. Together they form a unique fingerprint.

Cite this