Title: A game theoretic approach based on intrusion tolerant systems

Authors: Nouhad Sanoussi; Ghizlane Orhanou; Said El Hajji

Addresses: Laboratory of Mathematics, Computing and Applications – Information Security, Faculty of Sciences, Mohammed V University in Rabat, BP1014 RP, Rabat, Morocco ' Laboratory of Mathematics, Computing and Applications – Information Security, Faculty of Sciences, Mohammed V University in Rabat, BP1014 RP, Rabat, Morocco ' Laboratory of Mathematics, Computing and Applications – Information Security, Faculty of Sciences, Mohammed V University in Rabat, BP1014 RP, Rabat, Morocco

Abstract: Despite the enormous efforts made to guarantee a great level of security in the network, this is still far from being completely solved. Hence, to continue providing proper services in threatening environments there is a need for intrusion tolerance. The purpose of an intrusion tolerant system (ITS) is to survive against every intrusion, rather than to prevent them. Unfortunately, these mechanisms of defence require a huge investment and an accurate study of the network to effectively secure the infrastructure. The weakness of the traditional network security solutions is that they lack a quantitative decision framework. Game theory approaches proved their efficiency in this issue. Therefore, in this paper, we propose a game theoretic approach to model the attack-defence interaction in taking into account both internal and external attacks and analyse the effect of intrusion tolerant system on the payoff of both the internal and external attacker and the defender. A MATLAB simulation is used to illustrate the game model and calculate the frequency of attack strategy and invest in tolerance strategy.

Keywords: network security; intrusion tolerant system; ITS; game theory; attacker; Bayesian game.

DOI: 10.1504/IJSN.2020.109698

International Journal of Security and Networks, 2020 Vol.15 No.3, pp.175 - 181

Received: 27 Jun 2019
Accepted: 19 Sep 2019

Published online: 21 Sep 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article