Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 5

Strategic form of the game in existing work.

ā€‰MonitorNot monitor

Attack

Not attack