The paper mainly reflects on optimal game theory with the utilization of IPDRS (Internet protocol detail record streaming) in order to provide proper network security. The main aim of this paper is to provide proper network security by IPDRS engine in order to resolve the issues of disruption as well as data hacking (Chandran and AM 2015).It is identified that the proposed system helps in presenting one of the game-theoretical study of the problems of resource allocation, routing as well as security based problems.
In this paper numbers of research articles are reviewed in order to research on the importance of game based theory of network security with the help of IPDRS engine. The paper also highlights the research problem as well as the need for this research project.
It is identified that the problems of network security are often challenging due to the growing complexity as well as due to the interconnected nature of various distributed system that generally leads to limited capability of control as well as observation (Manshaei et al. 2014). It is identified that theoretical model at the various levels of the system plays an important role in securing the network for providing high level security related decision making.. In this particular model, the decision maker either helps in playing the role of a defender or an attacker. In the case of attack, proper intrusion based response system is needed for preventing intrusion within the system (Fielder et al. 2014). Earlier the game theory technique is utilized in which the intruder is mainly found with the help of either response or recovery method. The problem that is identified in that work is that if a header misplays the game then all the client who are under the network will suffer due to access of data. So it is considered as one of the greatest drawback from the existing work.
The main gap in the knowledge associated with optimal game theory with the utilization of IPDRS engine is that the utilization of IPDRS not proper for securing larger network. This is because IPDRS becomes complex while dealing with larger network. Thus, it is identified that optimal game theory with the utilization of IPDRS engine is not proper for larger network. This gap in knowledge can create issues while the system approach of optimal game theory by utilizing IPDRS engine is utilized for securing larger network.
According to Sanjab Saad and Ba?ar (2017), problem of providing anonymity is considered for network communication when number of adversary compromises due to unknown subset of nodes within the network. Proper game based theory is proposed as well as proved the survival of Nash equilibrium. It is identified that the numerical simulation is mainly dependent on simple switching network for reflecting that this approach helps in providing proper insight into optimal design for ammonizing various strategies as well as optimal adversarial behavior. It is stated by Nagurney, Daniele and Shukla (2017), that the complexity that is associated with the computation of Nash equilibrium is not associated with the work but it is considered as one of the efficient algorithm for fortifying the result. In this work, proper network models, proper assumed knowledge associated with topology as well as sessions are generally used. It is identified that a similar approach for random networks are mainly used with random connections on scaling behavior of anonymous communication.
It is opined by Nagurney, Nagurney and Shukla (2015) that the work mainly presented proper framework for clarifying DoS attacks into multi source as well as single attacks. Moreover, it is identified that the use of header packets for classifying the attacks generally helps in developing two new approaches which are generally dependent on the information in the attack packet stream. It identified that the frameworks are generally validated with attacks for capturing second monitoring site. Experiments as well as proper simulations are generally used for clarifying the underlying reason for the various types of attack characteristics. On the other hand, it is stated by Gang et al. (2014) that a new protocol is presented that is quite helpful in protecting against various malicious bandwidth consumption by utilizing proper adaptive client puzzles or pushing their generation into number of intermediary routers (Kamhoua et al. 2014). The router helps in modifying the level of complexity as per the global measurement of flows that is mainly directed for particular destinations. It is identified that in this case, number of adversaries protocols such as alternating time temporal helps in providing a concise as well as powerful language in order to express the properties as well as characteristics of interest.
According to Ge et al. (2014), game theoretic model is considered as one of the defensive mechanism against classic bandwidth that generally consumes DDos attacks. It is identified that the validation of various analytical results are generally performed with the help of NS-3 network simulation tool. In the future work, it s identified the existence of multiple equilibrium is advantageous (Chen et al. 2015). The utilization of TCP congestion is considered as one of the example of such a possibility. Furthermore, it is analyzed that dynamic game where both the defender as well as attacker can alter their strategies during the event of the attack. They generally also plays for altering the contribution of NetHook module to codebases for making it available for other researchers who are generally involved in packet manipulation within the simulator.
The research project is mainly needed in order to resolve the issues that are associated with network security. It is identified that the system is mainly constructed with the help of client server based approach which has the monitoring as well as puzzle providing procedure. In this entire system, a client node is generally sent out a request message to the server (Zonouz et al. 2014). The server will be helpful in receiving all the details of the client. It is found that the system helps in presenting two methods for generating puzzles as per the network behavior purposes. One of the significant works of the client puzzle is the amount of computation that is generally required for resolving issues as well as challenges.
The puzzles which are generally utilized do not generally require sequential operations. In addition to this, the data cannot be accessed under proper pre-determined game is solved. Moreover, numerous number of game based defense mechanism is proposed against different network attacks (Guo et al. 2016) The mechanism is not only designed with the help of formal approaches and therefore some of the design issues such as optimality as well as effectiveness remain unresolved. The paper mainly helps in exploiting game theory for proposing optimal game based strategies. The system that is proposed helps in presenting a game theoretic study for the issues of routing as well as security based issues.
Conclusion
It can be concluded from the research that current intrusion detection have very much limited mechanism of response which are considered inadequate in comparison to the current threat. It is analyzed that the proposed system is generally dependent on three different techniques including prevention, detection as well as game based response technique. It helps in achieving the better security among the entire network and thus the system of game based network defending system with the utilization of IPDRS engine is considered advantageous. In spite of this it is analyzed that IPDRS engine is not suitable for securing larger network as it becomes complex while dealing with larger network.
References
Chandran, S. and AM, R., 2015. Optimal Game Theory for Network Security using IPDRS Engine. work, 4(1).
Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the full-duplex relay system. IEEE transactions on information forensics and security, 10(3), pp.574-583.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2014, June. Game theory meets information security management. In IFIP International Information Security Conference (pp. 15-29). Springer, Berlin, Heidelberg.
Gang, L.I.U., Hong, Z.H.A.N.G. and Qian–mu, L.I., 2014. Network security optimal attack and defense decision-making method based on game model. Journal of Nanjing university of science and technology, 38, pp.12-21.
Ge, L., Yu, W., Shen, D., Chen, G., Pham, K., Blasch, E. and Lu, C., 2014. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD). vol, 9085, pp.90850Q-90850Q.
Guo, H., Wang, X., Cheng, H. and Huang, M., 2016. A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks. Applied Soft Computing, 38, pp.469-476.
Kamhoua, C.A., Kwiat, L., Kwiat, K.A., Park, J.S., Zhao, M. and Rodriguez, M., 2014, June. Game theoretic modeling of security and interdependency in a public cloud. In Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on (pp. 514-521). IEEE.
Manshaei, M.H., Zhu, Q., Alpcan, T., Bac?ar, T. and Hubaux, J.P., 2013. Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), p.25.
Nagurney, A., Daniele, P. and Shukla, S., 2017. A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints. Annals of Operations Research, 248(1-2), pp.405-427.
Nagurney, A., Nagurney, L.S. and Shukla, S., 2015. A supply chain game theory framework for cybersecurity investments under network vulnerability. In Computation, cryptography, and network security (pp. 381-398). Springer International Publishing.
Sanjab, A., Saad, W. and Ba?ar, T., 2017. Prospect Theory for Enhanced Cyber-Physical Security of Drone Delivery Systems: A Network Interdiction Game. arXiv preprint arXiv:1702.04240.
Zonouz, S.A., Khurana, H., Sanders, W.H. and Yardley, T.M., 2014. RRE: A game-theoretic intrusion response and recovery engine. IEEE Transactions on Parallel and Distributed Systems, 25(2), pp.395-406.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download