Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Figure 2

Payoff of the defender with respect to if is fixed as .