SlideShare a Scribd company logo
RRE: A Game-Theoretic Intrusion Response and Recovery 
Engine 
ABSTRACT: 
Preserving the availability and integrity of networked computing systems in the 
face of fast-spreading intrusions requires advances not only in detection 
algorithms, but also in automated response techniques. In this paper, we propose a 
new approach to automated response called the response and recovery engine 
(RRE). Our engine employs a game-theoretic response strategy against adversaries 
modeled as opponents in a two-player Stackelberg stochastic game. The RRE 
applies attack-response trees (ART) to analyze undesired system-level security 
events within host computers and their countermeasures using Boolean logic to 
combine lower level attack consequences. In addition, the RRE accounts for 
uncertainties in intrusion detection alert notifications. The RRE then chooses 
optimal response actions by solving a partially observable competitive Markov 
decision process that is automatically derived from attack-response trees. To 
support network-level multiobjective response selection and consider possibly 
conflicting network security properties, we employ fuzzy logic theory to calculate 
the network-level security metric values, i.e., security levels of the system’s current
and potentially future states in each stage of the game. In particular, inputs to the 
network-level game-theoretic response selection engine, are first fed into the fuzzy 
system that is in charge of a nonlinear inference and quantitative ranking of the 
possible actions using its previously defined fuzzy rule set. Consequently, the 
optimal network-level 
response actions are chosen through a game-theoretic optimization process. 
Experimental results show that the RRE, using Snort’s alerts, can protect large 
networks for which attack-response trees have more than 500 nodes. 
EXISTING SYSTEM: 
The severity and number of intrusions on computer networks are rapidly 
increasing. Generally, incident-handling techniques are categorized into three 
broad classes. First, there are intrusion prevention methods that take actions to 
prevent occurrence of attacks, for example, network flow encryption to prevent 
man-in-the-middle attacks. Second, there are intrusion detection systems (IDSes), 
such as Snort, which try to detect inappropriate, incorrect, or anomalous network 
activities, for example, perceiving CrashIIS attacks by detecting malformed packet 
payloads. Finally, There are intrusion response techniques that take responsive 
actions based on received IDS alerts to stop attacks before they can cause
significant damage and to ensure safety of the computing environment. So far, 
most research has focused on improving techniques for intrusion prevention and 
detection, while intrusion response usually remains a manual process performed by 
network administrators who are notified by IDS alerts and respond to the 
intrusions. This manual response process inevitably introduces some delay 
between notification and response,. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Which could be easily exploited by the attacker to achieve his or her 
goal and significantly increase the damage. 
 To reduce the severity of attack damage resulting from delayed 
response, an automated intrusion response is required that provides 
instantaneous response to intrusion. 
PROPOSED SYSTEM: 
In this paper, we present an automated cost-sensitive intrusion response system 
called the response and recovery engine (RRE) that models the security battle 
between itself and the attacker as a multistep, sequential, hierarchical, non zero
sum, two-player stochastic game. In each step of the game, RRE leverages a new 
extended attack tree structure, called the attack-response tree (ART), and received 
IDS alerts to evaluate various security properties of the individual host systems 
within the network. ARTs provide a formal way to describe host system security 
based on possible intrusion and response scenarios for the attacker and response 
engine, respectively. More importantly, ARTs enable RRE to consider inherent 
uncertainties in alerts received from IDSes (i.e., false positive and false negative 
rates), when estimating the system’s security and deciding on response actions. 
Then, the RRE automatically converts the attack-response trees into partially 
observable competitive Markov decision processes that are solved to find the 
optimal response action against the attacker, in the sense that the maximum 
discounted accumulative damage that the attacker can cause later in the game is 
minimized. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Improves its scalability for large-scale computer networks, in which RRE is 
supposed to protect a large number of host computers against malicious 
attackers.
 Finally, separation of high- and low-level security issues significantly 
simplifies the accurate design of response engines. 
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL
REFERENCE: 
Saman A. Zonouz, Himanshu Khurana, William H. Sanders, and Timothy M. 
Yardley “RRE: A Game-Theoretic Intrusion Response and Recovery Engine” 
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 
VOL. 25, NO. 2, FEBRUARY 2014

More Related Content

DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
IEEEMEMTECHSTUDENTPROJECTS
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
PDF
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
IJRES Journal
 
PPTX
Cyber intrusion
Kishor Datta Gupta
 
PDF
NSAS: NETWORK SECURITY AWARENESS SYSTEM
International Journal of Technical Research & Application
 
PPT
Ch10 Conducting Audits
Information Technology
 
PPTX
Deep learning approach for network intrusion detection system
Avinash Kumar
 
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
IEEEMEMTECHSTUDENTPROJECTS
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
IJRES Journal
 
Cyber intrusion
Kishor Datta Gupta
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
International Journal of Technical Research & Application
 
Ch10 Conducting Audits
Information Technology
 
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 

What's hot (15)

PPTX
Goals of protection
veena ali
 
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
PPTX
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
 
PDF
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 
PDF
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET Journal
 
PDF
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
VLSICS Design
 
PPTX
Network Intrusion Detection and Countermeasure Selection
Pramod M Mithyantha
 
PDF
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
PDF
Icacci presentation-cnn intrusion
vinaykumar R
 
PDF
AI for Cybersecurity Innovation
Pete Burnap
 
PPTX
Situational awareness for computer network security
mmubashirkhan
 
PDF
1776 1779
Editor IJARCET
 
PPTX
Least privilege, access control, operating system security
Prachi Gulihar
 
PPTX
Os security issues
JOLLUSUDARSHANREDDY
 
PDF
Kx3419591964
IJERA Editor
 
Goals of protection
veena ali
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET Journal
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
VLSICS Design
 
Network Intrusion Detection and Countermeasure Selection
Pramod M Mithyantha
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
Icacci presentation-cnn intrusion
vinaykumar R
 
AI for Cybersecurity Innovation
Pete Burnap
 
Situational awareness for computer network security
mmubashirkhan
 
1776 1779
Editor IJARCET
 
Least privilege, access control, operating system security
Prachi Gulihar
 
Os security issues
JOLLUSUDARSHANREDDY
 
Kx3419591964
IJERA Editor
 
Ad

Similar to JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine (20)

DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEFINALYEARSTUDENTPROJECT
 
PDF
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 
PDF
A multi agent based decision mechanism for incident reaction in telecommunica...
Luxembourg Institute of Science and Technology
 
PDF
A multi agent based decision mechanism for incident reaction in telecommunica...
christophefeltus
 
PDF
Business governance based policy regulation for security incident response
Luxembourg Institute of Science and Technology
 
PDF
Optimal Security Response to Network Intrusions in IT Systems
Kim Hammar
 
PDF
Implementing a Robust Network-Based Intrusion Detection System
theijes
 
PDF
Multi agents based architecture for is security incident reaction
Luxembourg Institute of Science and Technology
 
PDF
Multi agents based architecture for is security incident reaction
christophefeltus
 
DOCX
NS2 projects 2014 at HCL
Senthilvel S
 
PDF
A Study of Intrusion Detection System Methods in Computer Networks
Editor IJCATR
 
PDF
A security decision reaction architecture for heterogeneous distributed network
Luxembourg Institute of Science and Technology
 
PDF
A security decision reaction architecture for heterogeneous distributed network
christophefeltus
 
PDF
Optimizing cybersecurity incident response decisions using deep reinforcemen...
IJECEIAES
 
PDF
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IJMTST Journal
 
PDF
SentryHQ's Reactive Security
Amr Ali
 
PDF
Intrusion Tolerance as a Two-Level Game - GameSec24
Kim Hammar
 
PDF
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Kim Hammar
 
PDF
A Game Theoretic Analysis of Intrusion Detection in Access Control Systems - ...
Kim Hammar
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
IEEEFINALYEARSTUDENTPROJECT
 
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 
A multi agent based decision mechanism for incident reaction in telecommunica...
Luxembourg Institute of Science and Technology
 
A multi agent based decision mechanism for incident reaction in telecommunica...
christophefeltus
 
Business governance based policy regulation for security incident response
Luxembourg Institute of Science and Technology
 
Optimal Security Response to Network Intrusions in IT Systems
Kim Hammar
 
Implementing a Robust Network-Based Intrusion Detection System
theijes
 
Multi agents based architecture for is security incident reaction
Luxembourg Institute of Science and Technology
 
Multi agents based architecture for is security incident reaction
christophefeltus
 
NS2 projects 2014 at HCL
Senthilvel S
 
A Study of Intrusion Detection System Methods in Computer Networks
Editor IJCATR
 
A security decision reaction architecture for heterogeneous distributed network
Luxembourg Institute of Science and Technology
 
A security decision reaction architecture for heterogeneous distributed network
christophefeltus
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
IJECEIAES
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IJMTST Journal
 
SentryHQ's Reactive Security
Amr Ali
 
Intrusion Tolerance as a Two-Level Game - GameSec24
Kim Hammar
 
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Kim Hammar
 
A Game Theoretic Analysis of Intrusion Detection in Access Control Systems - ...
Kim Hammar
 
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
chennaijp
 
DOCX
JPN1423 Stars a Statistical Traffic Pattern
chennaijp
 
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
chennaijp
 
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
chennaijp
 
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
chennaijp
 
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
chennaijp
 
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
chennaijp
 
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
chennaijp
 
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
chennaijp
 
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
chennaijp
 
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
chennaijp
 
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
chennaijp
 
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
chennaijp
 
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
chennaijp
 
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
chennaijp
 
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
chennaijp
 
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
chennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
chennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
chennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
chennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
chennaijp
 

Recently uploaded (20)

PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Zero Carbon Building Performance standard
BassemOsman1
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
Information Retrieval and Extraction - Module 7
premSankar19
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 

JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine

  • 1. RRE: A Game-Theoretic Intrusion Response and Recovery Engine ABSTRACT: Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in automated response techniques. In this paper, we propose a new approach to automated response called the response and recovery engine (RRE). Our engine employs a game-theoretic response strategy against adversaries modeled as opponents in a two-player Stackelberg stochastic game. The RRE applies attack-response trees (ART) to analyze undesired system-level security events within host computers and their countermeasures using Boolean logic to combine lower level attack consequences. In addition, the RRE accounts for uncertainties in intrusion detection alert notifications. The RRE then chooses optimal response actions by solving a partially observable competitive Markov decision process that is automatically derived from attack-response trees. To support network-level multiobjective response selection and consider possibly conflicting network security properties, we employ fuzzy logic theory to calculate the network-level security metric values, i.e., security levels of the system’s current
  • 2. and potentially future states in each stage of the game. In particular, inputs to the network-level game-theoretic response selection engine, are first fed into the fuzzy system that is in charge of a nonlinear inference and quantitative ranking of the possible actions using its previously defined fuzzy rule set. Consequently, the optimal network-level response actions are chosen through a game-theoretic optimization process. Experimental results show that the RRE, using Snort’s alerts, can protect large networks for which attack-response trees have more than 500 nodes. EXISTING SYSTEM: The severity and number of intrusions on computer networks are rapidly increasing. Generally, incident-handling techniques are categorized into three broad classes. First, there are intrusion prevention methods that take actions to prevent occurrence of attacks, for example, network flow encryption to prevent man-in-the-middle attacks. Second, there are intrusion detection systems (IDSes), such as Snort, which try to detect inappropriate, incorrect, or anomalous network activities, for example, perceiving CrashIIS attacks by detecting malformed packet payloads. Finally, There are intrusion response techniques that take responsive actions based on received IDS alerts to stop attacks before they can cause
  • 3. significant damage and to ensure safety of the computing environment. So far, most research has focused on improving techniques for intrusion prevention and detection, while intrusion response usually remains a manual process performed by network administrators who are notified by IDS alerts and respond to the intrusions. This manual response process inevitably introduces some delay between notification and response,. DISADVANTAGES OF EXISTING SYSTEM:  Which could be easily exploited by the attacker to achieve his or her goal and significantly increase the damage.  To reduce the severity of attack damage resulting from delayed response, an automated intrusion response is required that provides instantaneous response to intrusion. PROPOSED SYSTEM: In this paper, we present an automated cost-sensitive intrusion response system called the response and recovery engine (RRE) that models the security battle between itself and the attacker as a multistep, sequential, hierarchical, non zero
  • 4. sum, two-player stochastic game. In each step of the game, RRE leverages a new extended attack tree structure, called the attack-response tree (ART), and received IDS alerts to evaluate various security properties of the individual host systems within the network. ARTs provide a formal way to describe host system security based on possible intrusion and response scenarios for the attacker and response engine, respectively. More importantly, ARTs enable RRE to consider inherent uncertainties in alerts received from IDSes (i.e., false positive and false negative rates), when estimating the system’s security and deciding on response actions. Then, the RRE automatically converts the attack-response trees into partially observable competitive Markov decision processes that are solved to find the optimal response action against the attacker, in the sense that the maximum discounted accumulative damage that the attacker can cause later in the game is minimized. ADVANTAGES OF PROPOSED SYSTEM:  Improves its scalability for large-scale computer networks, in which RRE is supposed to protect a large number of host computers against malicious attackers.
  • 5.  Finally, separation of high- and low-level security issues significantly simplifies the accurate design of response engines. SYSTEM ARCHITECTURE:
  • 6. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL
  • 7. REFERENCE: Saman A. Zonouz, Himanshu Khurana, William H. Sanders, and Timothy M. Yardley “RRE: A Game-Theoretic Intrusion Response and Recovery Engine” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014