Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Tab 2
/
Research Article
Game Theoretical Method for Anomaly-Based Intrusion Detection
Table 2
Two-stage pure-strategic intrusion detection game.
Players
Attacker, defender
Strategy sets
Attacker: Attack, not attack, attack intensity
Defender: Monitor, not monitor, detection threshold
Constraints
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Payoffs
,
(see Table
1
)
Game target
The players choose their strategies to maximize their payoffs
,