[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3661638.3661711acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

Intrusion detection and response of network node attacks based on game theory

Published: 01 June 2024 Publication History

Abstract

Aiming at the problem that the traditional one-to-one correspondence method is cumbersome and lacks of effective correspondence when responding to the intrusion detection results after the detection of network node attacks, an intrusion detection and response structure based on game theory is proposed, and an intrusion detection and response model based on Markov game decision is established. Considering the system resources, response cost, detection rate, false positive rate and false negative rate, the response decision of intrusion detection system is simulated under the condition of considering the resource consumption and detection accuracy. The factors influencing the intrusion response decision are analyzed experimentally, which provides experimental basis for practical application.

References

[1]
Wang Zhendong, Zhang Lin, Li Dahai. Overview of Internet of Things Intrusion detection Systems based on Machine Learning [J]. Computer Engineering and Applications, 2021, 57 (04) : 18-27.
[2]
Zhang Zhifei, Liu Feng, Ge Yiyang, An intrusion detection method based on depth-separable Convolution and attention mechanism [J]. Journal of the Internet of Things, 2023,7(01):49-59.
[3]
Kabir B, Pamir, Ullah A, Detection of Non-Technical Losses Using MLP-GRU Based Neural Network to Secure Smart Grids [C]. Conference on Complex, Intelligent, and Software Intensive Systems. Springer, Cham, 2021: 383-394.
[4]
Kholidy H A, Erradi A, Abdelwahed S, et al. A risk mitigation approach for autonomous cloud intrusion response system [J]. Computing, 2016, 98(11):1-25.
[5]
Gao Ni, He Yiyue, Gao Ling. Deep Learning Method for Intrusion detection in massive data environment [J]. Applied Research of Computer, 2018,35 (4) : 1197-1200.
[6]
Xue J,Shen B,A novel swarm intelligence optimization approach:sparrow serach algorithm [J]systems ence&Control Engineering An open Access Journal, 2020, 8(1)22-34
[7]
Cheng Chao, WU Jingkai, Chen Mei. An Intrusion detection Algorithm of wireless sensor Networks based on RBM⁃SVM Algorithm [J]. Computer Applications and Software, 2022 (5) : 325⁃329.
[8]
Zhang Xiaowei. Application of cloud computing technology in computer network security storage [J]. Digital World, 2021, 000 (005) : 68-69.
[9]
[J]. Digital World, 2021, 000 (005) : 68-69.Yang Xu. Intrusion Response Decision Model based on Dynamic Game [D]. Jilin University,2011.Brian K. Reid. 1980. A high-level approach to computer document formatting. In Proceedings of the 7th Annual Symposium on Principles of Programming Languages. ACM, New York, 24–31. https://doi.org/10.1145/567446.567449
[10]
Josephina Antoniou: Game Theory, the Internet of Things and 5G Networks - Utilizing Game Theoretic Models to Characterize Challenging Scenarios. [C] Springer 2020, ISBN 978-3-030-16843-8, pp. 1-106.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
December 2023
467 pages
ISBN:9798400716966
DOI:10.1145/3661638
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Game theory
  2. Intrusion detection
  3. Intrusion response

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AISNS 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 28
    Total Downloads
  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)3
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media