### Quantum Bayesian Game Modeling for Intrusion Detection

#### Abstract

#### Full Text:

PDF#### References

V. Chandola, A. Banerjee, V. Kumar. Anomaly detection: A survey, ACM computing surveys (CSUR), vol. 41, no. 3, pp. 15, 2009.

A.K. Dixit and S. Skeath, Games of Strategy, 4th Int. Student Edition, WW Norton & Company, new Jersey, USA, 2015.

R.T. Perry, The temple of quantum computing, Riley Perry standard, Australia, Available on: http://www. toqc. com/TOQCv1_1.pdf. Accessed: April, 27, 2006.

U. Faigle and M. Grabisch, Game theoretic interaction and decision: A quantum analysis, Games, vol. 48, no. 8, pp. 1-29, 2017.

P. Bruza, J. Busemeyer and L. Gabora, Introduction to the special issue on quantum cognition, arXiv preprint arXiv, pp. 1309.5673, 2013.

E.M. Pothos and J.R. Busemeyer, Can quantum probability provide a new direction for cognitive modeling?, Behavioral and Brain Sciences, vol. 36, no. 3, pp. 255-274, 2013.

R. Penrose, Shadows of the Mind, Oxford University Press, USA, vol. 4, 1994.

C.M. Chen, Y.L. Chen and H.C. Lin, An efficient network intrusion detection, Computer Communications, vol. 33, no. 4, pp. 477-484, 2010.

M. Tavallaee, E. Bagheri, W. Lu and A.A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, Proc. of the 2nd IEEE Symp. on Computational Intelligence for Security and Defence Applications, Ottawa, Ontario, Canada, pp. 53-58, July 08-10, 2009.

S.T. Powers, J. He ,A hybrid artificial immune system and Self Organizing Map for network intrusion detection, Information Sciences, vol. 178, no. 15, pp. 3024-3042, 2008.

J.C. Harsanyi, Games with incomplete information played by Bayesian players, The Basic Model & Management Science,

vol. 50, no.12, Supplement, pp. 1804-1817, 2004.

S. Shen, G. Yue, Q. Cao and F. Yu, A survey of game theory in wireless sensor networks security, J. Networks, vol. 6, no. 3,

pp. 521-532, 2011.

G. Anuvarsha and K.J. Rajesh, Survey on automated intrusion response system using game theory, Int. J. Adv. Res. Comp. and Commun. Engg., vol. 3, no. 11, pp. 8384-8387, 2014.

Y. Liu, C. Comaniciu, and H. Man, A Bayesian game approach for intrusion detection in wireless ad hoc networks, Proc. of Workshop on Game theory for Communications and Networks ACM,vol.199, pp. 4, 2006.

Y. Liu, H. Man and C. Comaniciu, A game theoretic approach to efficient mixed strategies for intrusion detection, IEEE Int. Conf. on Communications, vol. 5, pp. 2201-2206, 2006.

T. Poongothai and K. Jayara, A noncooperative game approach for intrusion detection in mobile adhoc networks, Proc. of Int. Conf. on Computing Communication and Networking, St. Thomas, VI, December 18-20, pp. 1-4, 2008.

H. Otrok, N. Mohammed, L. Wang, M. Debbabi and

P. Bhattacharya, A game-theoretic intrusion detection model for mobile ad hoc networks, Comp. Commun., vol. 31, no.4,

pp.708-721, 2008.

N. Marchang and R. Tripathi, A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks, Int. Conf. in Adv. Computing and Communications, ADCOM 2007, pp. 460-464, 2007.

M. Rdei and S.J. Summers, Quantum probability theory, Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics, vol. 38, no. 2, pp. 390-417, 2007.

R. Blutner and P.B. Graben, Quantum cognition and bounded rationality, Syntheses, vol.193, no.10, pp. 32393291, 2015.

A. Iqbal, J.M. Chappell, Q. Li, C.E. Pearce and D. Abbott,

A probabilistic approach to quantum Bayesian games of incomplete information, Quantum Information Processing, vol. 13, no. 12,

pp. 2783-2800, 2014.

S. Zahir, J. Pak, J. Singh, J. Pawlick and Q. Zhu, Protection and deception: Discovering game theory and cyber literacy through a novel board game experience, 2015 USENIX Summit on Gaming, Games and Gamification in Security Education, 2015.

T. Alpcan and T. Basar, A game theoretic approach to decision and analysis in network intrusion detection, Decision and Control, Proc., 42nd IEEE Conf., vol. 3, pp. 2595-2600, 2003.

E.O. Ibidunmoye, B.K. Alese, O.S. Ogundele, A Game-theoretic scenario for modelling the attacker-defender interaction, J. Comput. Eng. Inf. Technol, vol. 2, no. 1, pp. 27-32, 2013.

H. Wei and H. Sun H, Using bayesian game model for intrusion detection in wireless ad hoc networks, Int. J. Communications, Network and System Sciences, vol. 3, no. 7, pp. 602, 2010.

L. Yu, Q. Donghua, A Bayesian Game Approach for Security Defense Strategy in WSN, Proc. of 2nd international Conference on Computer Application and System Modeling, Atlantis Press, Paris,France,vol.21. pp. 1084-1086, 2012.

A.P. Flitney and D. Abbott, An introduction to quantum game theory, Fluctuation and Noise Letters, vol.2, pp. R175-R187, 2002.

A.P. Flitney and D. Abbott, Advantage of a quantum player over a classical one in 2 2 quantum games, Proc. of the Royal Society of London A: Mathematical, Physical and Engineering Sciences,

vol. 459, no. 2038, pp. 2463-2474, 2003.

### Refbacks

- There are currently no refbacks.