Research Article
Game Theoretical Method for Anomaly-Based Intrusion Detection
Table 3
The results showing whether the inequality conditions in Theorems
4 and
5 and (4) in Theorem
6 are satisfied when
and
.
| | | | | Scenario L.4 | Scenario L.5 | Scenario L.6 | Scenario L.6 |
| IC 4.1 | × | IC 5.1 | × | IC 5.1 | × | IC 5.1 | × | IC 4.2 | √ | IC 5.2 | √ | IC 5.2 | √ | IC 5.2 | × |
|
|