Security and Communication Networks / 2020 / Article / Tab 2

Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 2

Two-stage pure-strategic intrusion detection game.

PlayersAttacker, defender

Strategy setsAttacker: Attack, not attack, attack intensity
Defender: Monitor, not monitor, detection threshold

Constraints, , , , , ,
, , , , ,
, , , ,

Payoffs, (see Table 1)
Game targetThe players choose their strategies to maximize their payoffs ,

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.