Featured Research

from universities, journals, and other organizations

Protecting networks is just a game

Date:
July 28, 2011
Source:
Inderscience Publishers
Summary:
Information technologists have used game theory to develop a defense mechanism for networks that is more effective than previous approaches.

How can an organization detect the onset of an attack on its computer network giving it time to respond quickly and block any intrusion or compromise of its data? Modern firewalls and other technology are already in place, but these have not prevented major attacks on prominent networks in recent months. Now, information technologist Heechang Shin of Iona College in New Rochelle, NY, has used game theory to develop a defense mechanism for networks that is more effective than previous approaches.

Writing in the International Journal of Business Continuity and Risk Management, Shin explains that with the tremendous growth in numbers of computing and other devices connected to networks, information systems security has become an issue of serious global concern. He points out that each incident might not only cause significant disruption to services affecting many thousands of people but for a commercial operation can take as much as 1 percent of annual sales, per incident. That number amounts to tens of millions of dollars for the average publicly listed company, Shin says.

Shin has now developed an effective anti-hacking tool based on a game theoretic model, called defensive forecasting, which can detect network intrusions in real time. The tool, by playing a "game" of reality versus forecast, wins when reality matches its forecast and it sends out an alert to block the intrusion.

Importantly, the tool works on real-time data flowing in and out of the network rather than analyzing logs, an approach that can only detect network intrusions after they have taken place. The game theoretic model continuously trains the tool so that it can recognize the patterns of typical network attacks: denial of service attacks, such as a syn flood, unauthorized access from remote machines in which login passwords are being guessed or brute-force tested, attacks by insiders with "superuser" or system root privileges or probing attacks in which software carries out surveillance or port scanning to find a way into the system.

In order to measure the effectiveness of the tool, Shin compared the approach using the semi-synthetic dataset generated from raw TCP/IP dump data by simulating a typical US Air Force LAN to a network intrusion system based on a support vector machine (SVM), which is considered one of the best classification methods for network intrusion detection. Experimental results show that the tool is as good as or better than the one based on SVM for detecting network intrusion while the tool adds the benefit of real-time detection.


Story Source:

The above story is based on materials provided by Inderscience Publishers. Note: Materials may be edited for content and length.


Journal Reference:

  1. Heechang Shin. Identifying network intrusion with defensive forecasting. International Journal of Business Continuity and Risk Management, 2011; 2 (2): 91 DOI: 10.1504/IJBCRM.2011.041487

Cite This Page:

Inderscience Publishers. "Protecting networks is just a game." ScienceDaily. ScienceDaily, 28 July 2011. <www.sciencedaily.com/releases/2011/07/110727131418.htm>.
Inderscience Publishers. (2011, July 28). Protecting networks is just a game. ScienceDaily. Retrieved July 24, 2014 from www.sciencedaily.com/releases/2011/07/110727131418.htm
Inderscience Publishers. "Protecting networks is just a game." ScienceDaily. www.sciencedaily.com/releases/2011/07/110727131418.htm (accessed July 24, 2014).

Share This




More Computers & Math News

Thursday, July 24, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Robot Parking Valet Creates Stress-Free Travel

Robot Parking Valet Creates Stress-Free Travel

AP (July 23, 2014) 'Ray' the robotic parking valet at Dusseldorf Airport in Germany lets travelers to avoid the hassle of finding a parking spot before heading to the check-in desk. (July 23) Video provided by AP
Powered by NewsLook.com
Six Indicted in StubHub Hacking Scheme

Six Indicted in StubHub Hacking Scheme

AP (July 23, 2014) Six people were indicted Wednesday in an international ring that took over more than 1,000 StubHub users' accounts and fraudulently bought tickets that were then resold. (July 23) Video provided by AP
Powered by NewsLook.com
The Reviews Are In For The Amazon Fire Phone

The Reviews Are In For The Amazon Fire Phone

Newsy (July 23, 2014) Amazon's first smartphone, the Fire Phone, is set to ship this week, and so far the reviews have been pretty mixed. Video provided by Newsy
Powered by NewsLook.com
Bigger Apple Phone, Bigger Orders

Bigger Apple Phone, Bigger Orders

Reuters - Business Video Online (July 22, 2014) Apple is asking suppliers to make 70 to 80 million units of its new larger screen iPhone, a lot more initially than its current model. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins