Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 1

Strategic form of the local game.

ā€‰MonitorNot monitor

Attack
Not attack