IDEAS home Printed from https://ideas.repec.org/a/uae/soceng/y2014i2p31-40.html
   My bibliography  Save this article

Application of adversarial risk testing to anomaly-based network intrusion detection systems

Author

Listed:
  • Juan Luis Santos

    (University of Alcala - Institute for Economic and Social Analysis (IAES))

Abstract

This paper explores the decision-making process in the attacker-defender problem. First the hypothesis testing with Bayesian techniques with a game theoretical approach is presented. The result is improved through adversarial hypothesis testing, which incorporates the responses of attacker and defender in their decision-making processes. In this way it is possible to model in an accurate way how both agents decide their actions taking into account their assumptions on the behavior and mental processes of the other part. Then it presents an application in the field of information security to anomaly-based network intrusion systems. These systems monitor network or system activities for malicious activities or policy violations and produce reports in order to prevent subsequent attacks and help to identify where potential repairs are needed. Currently their algorithms are based on statistical tools with the aim of reducing errors taking into account the trade-off between the alpha and beta errors entailed by these detection systems. We claim the combination of agent-based models and adversarial hypotheses testing has the ability of improving these systems and helps in developing more efficient tools that take into account the rational and adaptive role of attackers.

Suggested Citation

  • Juan Luis Santos, 2014. "Application of adversarial risk testing to anomaly-based network intrusion detection systems," Journal of Socioeconomic Engineering, Instituto Universitario de Análisis Económico y Social, issue 2, pages 31-40, December.
  • Handle: RePEc:uae:soceng:y:2014:i:2:p:31-40
    as

    Download full text from publisher

    File URL: http://www3.uah.es/iaes/soceng/n2_santos.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Bernheim, B Douglas, 1984. "Rationalizable Strategic Behavior," Econometrica, Econometric Society, vol. 52(4), pages 1007-1028, July.
    2. Laura McLay & Casey Rothschild & Seth Guikema, 2012. "Robust Adversarial Risk Analysis: A Level- k Approach," Decision Analysis, INFORMS, vol. 9(1), pages 41-54, March.
    3. Pearce, David G, 1984. "Rationalizable Strategic Behavior and the Problem of Perfection," Econometrica, Econometric Society, vol. 52(4), pages 1029-1050, July.
    4. Martin J. Osborne & Ariel Rubinstein, 1994. "A Course in Game Theory," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262650401, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Asheim, G.B. & Dufwenberg, M., 1996. "Admissibility and Common Knowledge," Discussion Paper 1996-16, Tilburg University, Center for Economic Research.
    2. Joseph Y. Halpern & Rafael Pass, 2018. "Game theory with translucent players," International Journal of Game Theory, Springer;Game Theory Society, vol. 47(3), pages 949-976, September.
    3. Chen, Yi-Chun & Sun, Yifei, 2015. "Full implementation in backward induction," Journal of Mathematical Economics, Elsevier, vol. 59(C), pages 71-76.
    4. Geir B. Asheim & Mark Voorneveld & Jörgen W. Weibull, 2016. "Epistemically Robust Strategy Subsets," Games, MDPI, vol. 7(4), pages 1-16, November.
    5. Battigalli, Pierpaolo & Dufwenberg, Martin, 2009. "Dynamic psychological games," Journal of Economic Theory, Elsevier, vol. 144(1), pages 1-35, January.
    6. Edouard Kujawski, 2015. "Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources," Systems Engineering, John Wiley & Sons, vol. 18(4), pages 365-376, July.
    7. Dirk Bergemann & Stephen Morris & Olivier Tercieux, 2012. "Rationalizable Implementation," World Scientific Book Chapters, in: Robust Mechanism Design The Role of Private Information and Higher Order Beliefs, chapter 11, pages 375-404, World Scientific Publishing Co. Pte. Ltd..
    8. Dekel, Eddie & Siniscalchi, Marciano, 2015. "Epistemic Game Theory," Handbook of Game Theory with Economic Applications,, Elsevier.
    9. Panos L. Lorentziadis, 2020. "Value-Rationalizability in Auction Bidding," SN Operations Research Forum, Springer, vol. 1(2), pages 1-13, June.
    10. De Magistris, Enrico, 2024. "Incomplete preferences or incomplete information? On Rationalizability in games with private values," Games and Economic Behavior, Elsevier, vol. 144(C), pages 126-140.
    11. Battigalli Pierpaolo & Siniscalchi Marciano, 2003. "Rationalization and Incomplete Information," The B.E. Journal of Theoretical Economics, De Gruyter, vol. 3(1), pages 1-46, June.
    12. Yi-Chun Chen & Xiao Luo, 2012. "An indistinguishability result on rationalizability under general preferences," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 51(1), pages 1-12, September.
    13. Yi-Chun Chen & Xiao Luo & Chen Qu, 2016. "Rationalizability in general situations," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 61(1), pages 147-167, January.
    14. Luo, Xiao & Yang, Chih-Chun, 2009. "Bayesian coalitional rationalizability," Journal of Economic Theory, Elsevier, vol. 144(1), pages 248-263, January.
    15. van Damme, E.E.C., 2000. "Non-cooperative Games," Other publications TiSEM 51465233-a356-4d20-acc4-c, Tilburg University, School of Economics and Management.
    16. Xiao Luo, 2016. "Rational beliefs in rationalizability," Theory and Decision, Springer, vol. 81(2), pages 189-198, August.
    17. Michael Trost, 2012. "An Epistemic Rationale for Order-Independence," Jena Economics Research Papers 2012-010, Friedrich-Schiller-University Jena.
    18. R Jain & V Korpela & M Lombardi, 2021. "An Iterative Approach to Rationalizable Implementation," IEAS Working Paper : academic research 21-A001, Institute of Economics, Academia Sinica, Taipei, Taiwan.
    19. van Damme, E.E.C., 2015. "Game theory : Noncooperative games," Other publications TiSEM ff518f2b-501f-4d99-817b-c, Tilburg University, School of Economics and Management.
    20. Alexandra Belova & Philippe Gagnepain & Stéphane Gauthier, 2020. "An assessment of Nash equilibria in the airline industry," PSE Working Papers halshs-02932780, HAL.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:uae:soceng:y:2014:i:2:p:31-40. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Laura Suarez (email available below). General contact details of provider: https://edirc.repec.org/data/seuahes.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.