Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 2

Two-stage pure-strategic intrusion detection game.

PlayersAttacker, defender

Strategy setsAttacker: Attack, not attack, attack intensity
Defender: Monitor, not monitor, detection threshold

Constraints, , , , , ,
, , , , ,
, , , ,

Payoffs, (see Table 1)
Game targetThe players choose their strategies to maximize their payoffs ,