Featured Research

from universities, journals, and other organizations

Protecting networks is just a game

Date:
July 28, 2011
Source:
Inderscience Publishers
Summary:
Information technologists have used game theory to develop a defense mechanism for networks that is more effective than previous approaches.

How can an organization detect the onset of an attack on its computer network giving it time to respond quickly and block any intrusion or compromise of its data? Modern firewalls and other technology are already in place, but these have not prevented major attacks on prominent networks in recent months. Now, information technologist Heechang Shin of Iona College in New Rochelle, NY, has used game theory to develop a defense mechanism for networks that is more effective than previous approaches.

Writing in the International Journal of Business Continuity and Risk Management, Shin explains that with the tremendous growth in numbers of computing and other devices connected to networks, information systems security has become an issue of serious global concern. He points out that each incident might not only cause significant disruption to services affecting many thousands of people but for a commercial operation can take as much as 1 percent of annual sales, per incident. That number amounts to tens of millions of dollars for the average publicly listed company, Shin says.

Shin has now developed an effective anti-hacking tool based on a game theoretic model, called defensive forecasting, which can detect network intrusions in real time. The tool, by playing a "game" of reality versus forecast, wins when reality matches its forecast and it sends out an alert to block the intrusion.

Importantly, the tool works on real-time data flowing in and out of the network rather than analyzing logs, an approach that can only detect network intrusions after they have taken place. The game theoretic model continuously trains the tool so that it can recognize the patterns of typical network attacks: denial of service attacks, such as a syn flood, unauthorized access from remote machines in which login passwords are being guessed or brute-force tested, attacks by insiders with "superuser" or system root privileges or probing attacks in which software carries out surveillance or port scanning to find a way into the system.

In order to measure the effectiveness of the tool, Shin compared the approach using the semi-synthetic dataset generated from raw TCP/IP dump data by simulating a typical US Air Force LAN to a network intrusion system based on a support vector machine (SVM), which is considered one of the best classification methods for network intrusion detection. Experimental results show that the tool is as good as or better than the one based on SVM for detecting network intrusion while the tool adds the benefit of real-time detection.


Story Source:

The above story is based on materials provided by Inderscience Publishers. Note: Materials may be edited for content and length.


Journal Reference:

  1. Heechang Shin. Identifying network intrusion with defensive forecasting. International Journal of Business Continuity and Risk Management, 2011; 2 (2): 91 DOI: 10.1504/IJBCRM.2011.041487

Cite This Page:

Inderscience Publishers. "Protecting networks is just a game." ScienceDaily. ScienceDaily, 28 July 2011. <www.sciencedaily.com/releases/2011/07/110727131418.htm>.
Inderscience Publishers. (2011, July 28). Protecting networks is just a game. ScienceDaily. Retrieved September 1, 2014 from www.sciencedaily.com/releases/2011/07/110727131418.htm
Inderscience Publishers. "Protecting networks is just a game." ScienceDaily. www.sciencedaily.com/releases/2011/07/110727131418.htm (accessed September 1, 2014).

Share This




More Computers & Math News

Monday, September 1, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Apple's Rumored iWatch Could Cost $400

Apple's Rumored iWatch Could Cost $400

Newsy (Aug. 31, 2014) Apple is expected to charge a premium for its still-rumored wearable device. Video provided by Newsy
Powered by NewsLook.com
Amazon Chases Netflix And HBO With Five New Pilots

Amazon Chases Netflix And HBO With Five New Pilots

Newsy (Aug. 31, 2014) Amazon has released another batch of five pilots, allowing viewers to vote on which shows will get full seasons on the company's streaming service. Video provided by Newsy
Powered by NewsLook.com
Apple Wants Your iPhone To Become Your Wallet

Apple Wants Your iPhone To Become Your Wallet

Newsy (Aug. 31, 2014) Apple might soon announce a feature that would allow iPhones to act as a credit card when making payments in physical stores. Video provided by Newsy
Powered by NewsLook.com
Young Entrepreneurs Get $100,000, If They Quit School

Young Entrepreneurs Get $100,000, If They Quit School

AFP (Aug. 29, 2014) Twenty college-age students are getting 100,000 dollars from a Silicon Valley leader and a chance to live in San Francisco in order to work on the start-up project of their dreams, but they have to quit school first. Duration: 02:20 Video provided by AFP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins