dc.contributor.author | Καντζάβελου, Ιωάννα | el |
dc.contributor.author | Κατσικάς, Σωκράτης Κ. | el |
dc.date.accessioned | 2015-05-24T18:59:13Z | |
dc.date.available | 2015-05-24T18:59:13Z | |
dc.date.issued | 2015-05-24 | |
dc.identifier.uri | http://hdl.handle.net/11400/11070 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.sciencedirect.com/science/article/pii/S0167404810000611 | en |
dc.subject | Intrusion detection | |
dc.subject | Detection mechanism | |
dc.subject | Ανίχνευσης εισβολής | |
dc.subject | Μηχανισμός ανίχνευσης | |
dc.title | A game-based intrusion detection mechanism to confront internal attackers | en |
heal.type | journalArticle | |
heal.classification | Computer science | |
heal.classification | Computer programming | |
heal.classification | Πληροφορική | |
heal.classification | Προγραμματισμός | |
heal.classificationURI | http://data.seab.gr/concepts/77de68daecd823babbb58edb1c8e14d7106e83bb | |
heal.classificationURI | http://skos.um.es/unescothes/C00749 | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.classificationURI | **N/A**-Προγραμματισμός | |
heal.identifier.secondary | doi:10.1016/j.cose.2010.06.002 | |
heal.language | en | |
heal.access | campus | |
heal.recordProvider | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας. Σχολή Τεχνολογικών Εφαρμογών. Τμήμα Μηχανικών Πληροφορικής Τ.Ε. | el |
heal.publicationDate | 2010 | |
heal.bibliographicCitation | Kantzavelou, I. and Katsikas, S. (November 2010). A game-based intrusion detection mechanism to confront internal attackers. Computers & Security. 29(8). pp. 859-874. Elsevier B.V: 2010. Available from: http://www.sciencedirect.com/science/article/pii/S0167404810000611 [Accessed 08/07/2010] | en |
heal.abstract | Insiders might threaten organizations’ systems any time. By interacting with a system, an insider plays games with the security mechanisms employed to protect it. We apply game theory to model these interactions in an extensive form game that is being played repeatedly with an Intrusion Detection System (IDS). The outcomes of the game are quantified by first specifying players’ preferences, and then, by using the von Neumann–Morgenstern utility function, to assign numbers that reflect these preferences. Examining players’ best responses, the solution of the game follows by locating all the Nash Equilibria (NE). We extend the NE notion to the logit Quantal Response Equilibrium (QRE), to capture players’ bounded rationality and model insider’s behavior. The QRE results are more realistic, and show that the solution of the game might be significantly different than the corresponding NE solution. Thus, we determine how an insider will interact in the future, and how an IDS will react to protect the system. To easily exploit QRE results in ID, we propose the use of a detection mechanism. To present a possible implementation scheme of the detection mechanism, we give the application model and a detailed game-based detection algorithm. | en |
heal.publisher | Elsevier B.V. | en |
heal.journalName | Computers & Security | en |
heal.journalType | peer-reviewed | |
heal.fullTextAvailability | true |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: