Welcome to Francis Academic Press

Frontiers in Educational Research, 2019, 2(11); doi: 10.25236/FER.2019.021124.

The game analysis of the optimal configuration strategy of the intrusion detection system and intrusion detection system

Author(s)

Rong Chen 1,2,* , Qiying Cao1

Corresponding Author:
Rong Chen
Affiliation(s)

1 School of information science and technology, Donghua University, China
2 Shanghai Customs College, China
*Corresponding Author Email:[email protected]

Abstract

With the increasingly rampant intrusion, it is found that it is not enough to construct the security system from the Angle of defense. On how the computer and network resources malicious use behavior recognition and response, proposes the web application level intrusion detection defense system and intrusion detection system, the optimal allocation strategy game analysis. By comparison with literature analysis method, this paper expounded the basic structure of the intrusion detection system, using the game theory to establish virtual private networks (VPNS) and intrusion detection system model of information security technology combination, design companies and hackers mixed strategy Nash equilibrium in the game model analysis, and applied to the example analysis. The study finds that the manual survey strategy configured with two technologies was the same as when IDS is configured separately. Under certain conditions, it is better to configure two technical combinations to prevent hackers from intruding.

Keywords

Intrusion detection system; Private network; Optimal allocation strategy; Game analysis

Cite This Paper

Rong Chen, Qiying Cao. The game analysis of the optimal configuration strategy of the intrusion detection system and intrusion detection system. Frontiers in Educational Research (2019) Vol. 2 Issue 11: 142-154. https://doi.org/10.25236/FER.2019.021124.

References

[1] Horng S J, Su M Y, Chen Y H, et al (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Systems with Applications, vol.38, no.1, pp.306-313.
[2] Zhang Y, Wang L, Sun W, et al (2011). Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Transactions on Smart Grid, vol.2, no.4, pp.796-808.
[3] Lo C C, Huang C C, Ku J (2010). A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. IEEE, pp.280-284.
[4] Koc L, Mazzuchi T A, Sarkani S (2012). A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications, vol.39, no.18, pp.13492-13500.
[5] Lauf A P, Peters R A, Robinson W H (2010). A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Networks, vol.8, no.3, pp.253-266.
[6] Lin W C, Ke S W, Tsai C F (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-Based Systems, vol.78, no.1, pp.13-21.
[7] Yu Z, Zinger D, Bose A (2011). An innovative optimal power allocation strategy for fuel cell, battery and supercapacitor hybrid electric vehicle. Journal of Power Sources, vol.196, no.4, pp.351-2359.
[8] He L, Liang Z (2013). Optimal dynamic asset allocation strategy for ELA scheme of DC pension plan during the distribution phase. Insurance Mathematics & Economics, vol.52, no.2, pp.04-410.
[9] Kaibo Liu, Jianjun Shi (2013). Objective-oriented optimal sensor allocation strategy for process monitoring and diagnosis by multivariate analysis in a Bayesian network. Iie Transactions, vol.45, no.6, pp.630-643.
[10] Soury H, Bader F, Shaat M, et al (2012). Near Optimal Power Allocation Algorithm for OFDM-Based Cognitive Using Adaptive Relaying Strategy. IEEE, pp.212-217.