A Model of Intrusion Tolerant System Based on Game Theory
نویسندگان
چکیده
Intrusion tolerance is the rising third generation technology of network security. For the shortcomings of existing models, a model of intrusion tolerant system based on game theory is proposed. The intrusion tolerant system and the intruder are seen as the two sides of the game. The income functions of the two sides are designed basing on some given concepts. Through quantifying and analyzing the income functions, the optimum strategies of the intrusion tolerant system and the intruder are obtained, and the Nash equilibrium of the game system is achieved finally. The results of analysis show that, this proposed model of intrusion tolerant system is consistent with the practical system.
منابع مشابه
Modeling and Numerical Analysis of Revenue Sharing Contract Based on the Stackelberge Game Theory
Considered supply chain in this article consists of one vendor and multiple retailers where the vendor applies vendor managed inventory. Considering vendor as a leader and retailers as followers, Stackelberg game theory is applied for modeling and analyzing this system. A general mixed integer nonlinear model is developed which can optimizes the performance of the system under revenue sharing c...
متن کاملAnalysis of implementation of Tradable Green Certificates system in a competitive electricity market: a game theory approach
This paper investigates three models to implement Tradable Green Certificates (TGC) system with aid of game theory approach. In particular, the competition between thermal and renewable power plants is formulated in three models: namely cooperative, Nash and Stackelberg game models. The price of TGC is assumed to be determined by the legislative body (government) which is fixed. Numerical examp...
متن کاملA service decomposition and definition model in cloud manufacturing systems using game theory focusing on cost accounting perspectives
Cloud manufacturing is a new paradigm which has been under study since 2010 and a vast body of research has been conducted on this topic. Among them, service composition problems are of utmost importance. However, most studies only focused on private clouds meaning the objective function is defined for just one component of the supply chain. This paper attempts to consider service composition p...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer and Information Science
دوره 2 شماره
صفحات -
تاریخ انتشار 2009