Quantum Bayesian Game Modeling for Intrusion Detection


  • S. Munawar National College of Business Administration & Economics, Lahore
  • M. Hamid Virtual University of Pakistan, Lahore
  • S. A. Lodhi UVAS, Lahore


In cybersecurity, Intrusion detection plays a vital role in the network boundary detection. It develops the preventive measures for network defense. In this paper, it is presented the quantum cognition with the game theory strategy to detect the target attacks and normal packet classification in the network. The Quantum Bayesian game theory offers an efficient model of cognition to human rationality rather than the classical Bayesian game theory. This is inspired cognitive defense model in which a game modeling acts as the brain to determine the abnormal activity of network traffic rationally. It also analyzes the operation of the quantum game model between the attacker and defender detection system. The defender takes effective decision strategy in this model which maximizes their payoffs, according to the non-cooperative and incomplete imperfect information game strategy. Our modeling emphasized that quantum game theory is the effective dynamic solution, as a procedure of two player game to improve the probability of a defender issued a correct alarm and reduced the probability of defender issued a false alarm. It is as well to establish a rapid response of the system that uses in real time reconfiguration network security system.

Author Biographies

S. Munawar, National College of Business Administration & Economics, Lahore

School of Computer Science, 

M. Hamid, Virtual University of Pakistan, Lahore

Department of Computer Science

S. A. Lodhi, UVAS, Lahore

3Department of Statistics and Computer Science


V. Chandola, A. Banerjee, V. Kumar. “Anomaly detection: A survey”, ACM computing surveys (CSUR), vol. 41, no. 3, pp. 15, 2009.

A.K. Dixit and S. Skeath, “Games of Strategy”, 4th Int. Student Edition, WW Norton & Company, new Jersey, USA, 2015.

R.T. Perry, “The temple of quantum computing”, Riley Perry standard, Australia, Available on: http://www. toqc. com/TOQCv1_1.pdf. Accessed: April, 27, 2006.

U. Faigle and M. Grabisch, “Game theoretic interaction and decision: A quantum analysis”, Games, vol. 48, no. 8, pp. 1-29, 2017.

P. Bruza, J. Busemeyer and L. Gabora, “Introduction to the special issue on quantum cognition”, arXiv preprint arXiv, pp. 1309.5673, 2013.

E.M. Pothos and J.R. Busemeyer, “Can quantum probability provide a new direction for cognitive modeling?”, Behavioral and Brain Sciences, vol. 36, no. 3, pp. 255-274, 2013.

R. Penrose, “Shadows of the Mind”, Oxford University Press, USA, vol. 4, 1994.

C.M. Chen, Y.L. Chen and H.C. Lin, “An efficient network intrusion detection”, Computer Communications, vol. 33, no. 4, pp. 477-484, 2010.

M. Tavallaee, E. Bagheri, W. Lu and A.A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set”, Proc. of the 2nd IEEE Symp. on Computational Intelligence for Security and Defence Applications, Ottawa, Ontario, Canada, pp. 53-58, July 08-10, 2009.

S.T. Powers, J. He ,“A hybrid artificial immune system and Self Organizing Map for network intrusion detection”, Information Sciences, vol. 178, no. 15, pp. 3024-3042, 2008.

J.C. Harsanyi, “Games with incomplete information played by “Bayesian players”, The Basic Model & Management Science,

vol. 50, no.12, Supplement, pp. 1804-1817, 2004.

S. Shen, G. Yue, Q. Cao and F. Yu, “A survey of game theory in wireless sensor networks security”, J. Networks, vol. 6, no. 3,

pp. 521-532, 2011.

G. Anuvarsha and K.J. Rajesh, “Survey on automated intrusion response system using game theory”, Int. J. Adv. Res. Comp. and Commun. Engg., vol. 3, no. 11, pp. 8384-8387, 2014.

Y. Liu, C. Comaniciu, and H. Man, “A Bayesian game approach for intrusion detection in wireless ad hoc networks”, Proc. of Workshop on Game theory for Communications and Networks ACM,vol.199, pp. 4, 2006.

Y. Liu, H. Man and C. Comaniciu, “A game theoretic approach to efficient mixed strategies for intrusion detection”, IEEE Int. Conf. on Communications, vol. 5, pp. 2201-2206, 2006.

T. Poongothai and K. Jayara, “A noncooperative game approach for intrusion detection in mobile adhoc networks,” Proc. of Int. Conf. on Computing Communication and Networking, St. Thomas, VI, December 18-20, pp. 1-4, 2008.

H. Otrok, N. Mohammed, L. Wang, M. Debbabi and

P. Bhattacharya, “A game-theoretic intrusion detection model for mobile ad hoc networks”, Comp. Commun., vol. 31, no.4,

pp.708-721, 2008.

N. Marchang and R. Tripathi, “A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks”, Int. Conf. in Adv. Computing and Communications, ADCOM 2007, pp. 460-464, 2007.

M. Rédei and S.J. Summers, “Quantum probability theory”, Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics, vol. 38, no. 2, pp. 390-417, 2007.

R. Blutner and P.B. Graben, “Quantum cognition and bounded rationality”, Syntheses, vol.193, no.10, pp. 3239–3291, 2015.

A. Iqbal, J.M. Chappell, Q. Li, C.E. Pearce and D. Abbott,

“A probabilistic approach to quantum Bayesian games of incomplete information”, Quantum Information Processing, vol. 13, no. 12,

pp. 2783-2800, 2014.

S. Zahir, J. Pak, J. Singh, J. Pawlick and Q. Zhu, “Protection and deception: Discovering game theory and cyber literacy through a novel board game experience”, 2015 USENIX Summit on Gaming, Games and Gamification in Security Education, 2015.

T. Alpcan and T. Basar, “A game theoretic approach to decision and analysis in network intrusion detection”, Decision and Control, Proc., 42nd IEEE Conf., vol. 3, pp. 2595-2600, 2003.

E.O. Ibidunmoye, B.K. Alese, O.S. Ogundele, “A Game-theoretic scenario for modelling the attacker-defender interaction”, J. Comput. Eng. Inf. Technol, vol. 2, no. 1, pp. 27-32, 2013.

H. Wei and H. Sun H, “Using bayesian game model for intrusion detection in wireless ad hoc networks”, Int. J. Communications, Network and System Sciences, vol. 3, no. 7, pp. 602, 2010.

L. Yu, Q. Donghua, “A Bayesian Game Approach for Security Defense Strategy in WSN”, Proc. of 2nd international Conference on Computer Application and System Modeling, Atlantis Press, Paris,France,vol.21. pp. 1084-1086, 2012.

A.P. Flitney and D. Abbott, “An introduction to quantum game theory”, Fluctuation and Noise Letters, vol.2, pp. R175-R187, 2002.

A.P. Flitney and D. Abbott, “Advantage of a quantum player over a classical one in 2× 2 quantum games”, Proc. of the Royal Society of London A: Mathematical, Physical and Engineering Sciences,

vol. 459, no. 2038, pp. 2463-2474, 2003.




How to Cite

S. Munawar, M. Hamid, and S. A. Lodhi, “Quantum Bayesian Game Modeling for Intrusion Detection”, The Nucleus, vol. 54, no. 4, pp. 214–218, Dec. 2017.